Hey Guest!
smilie in place of the real @
Pretty Please - add it to our Events forum(s) and add to the calendar! >> Here's How << 
Time: Fri Oct 2 11:33:18 2020 -0400
IP: (deleted for security) (US/United States/msnbot-(deleted for security).search.msn.com)
Failures: 5 (mod_security)
Interval: 3600 seconds
Blocked: Permanent Block [LF_MODSEC]
Log entries:
[Fri Oct 02 11:32:20.994522 2020] [:error] [pid 9543] [client (deleted IP for security):1596] [client (deleted IP)] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?i?:[\\\\s()]case\\\\s*?\\\\()|(?:\\\\)\\\\s*?like\\\\s*?\\\\()|(?:having\\\\s*?[^\\\\s]+\\\\s*?[^\\\\w\\\\s])|(?:if\\\\s?\\\\([\\\\d\\\\w]\\\\s*?[=<>~]))" at ARGS_NAMES:120638-And-you-thought-you-were-having-a-bad-day-Question. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "65"] [id "942230"] [rev "2"] [msg "Detects conditional SQL injection attempts"] [data "Matched Data: having-a-bad-day- found within ARGS_NAMES:120638-And-you-thought-you-were-having-a-bad-day-Question: 120638-And-you-thought-you-were-having-a-bad-day-Question"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "9"] [accuracy "8"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [tag "WASCTC/WASC-19"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE1"] [tag "PCI/6.5.2"] [hostname "www.britishcarforum.com"] [uri "/bcf/showthread.php"] [unique_id "X3dIBCSDD8hAhX@OwoOs1AAAAAQ"]