=== DEBUG TRACE === Time: 2026-01-03 22:42:11 IP: 34.91.218.129 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='kevin.morris@bartec.co.uk', trimmed='kevin.morris@bartec.co.uk' *** EMAIL FOUND in direct field 'lid': 'kevin.morris@bartec.co.uk' *** User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Bot Detection Score: 30 Bot Detected: NO Bot Reasons: Missing JavaScript protection fields Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 79 All POST Keys: lid, pid Full POST Data: Array ( [lid] => kevin.morris@bartec.co.uk [pid] => dxt9cT]C6T2}x|rkx$r1S|2'(Ab1t ) JavaScript protection fields found: NONE Raw Input Length: 79 Raw Input (first 1000 chars): lid=kevin.morris%40bartec.co.uk&pid=dxt9cT%5DC6T2%7Dx%7Crkx%24r1S%7C2%27%28Ab1t Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: dxt9cT%5DC6T2%7Dx%7C Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 2 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': 'dxt9cT]C6T2}x|rkx$r1S|2'(Ab1t' (length: 29) *** Password found in field: pid (direct) Field 'pid' exists, value length: 29 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 29 Final password value (first 20 chars): dxt9cT]C6T2}x|rkx$r1 Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-03 22:42:12 IP: 34.91.218.129 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='kevin.morris@bartec.co.uk', trimmed='kevin.morris@bartec.co.uk' *** EMAIL FOUND in direct field 'lid': 'kevin.morris@bartec.co.uk' *** User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Bot Detection Score: 30 Bot Detected: NO Bot Reasons: Missing JavaScript protection fields Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 79 All POST Keys: lid, pid Full POST Data: Array ( [lid] => kevin.morris@bartec.co.uk [pid] => dxt9cT]C6T2}x|rkx$r1S|2'(Ab1t ) JavaScript protection fields found: NONE Raw Input Length: 79 Raw Input (first 1000 chars): lid=kevin.morris%40bartec.co.uk&pid=dxt9cT%5DC6T2%7Dx%7Crkx%24r1S%7C2%27%28Ab1t Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: dxt9cT%5DC6T2%7Dx%7C Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 2 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': 'dxt9cT]C6T2}x|rkx$r1S|2'(Ab1t' (length: 29) *** Password found in field: pid (direct) Field 'pid' exists, value length: 29 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 29 Final password value (first 20 chars): dxt9cT]C6T2}x|rkx$r1 Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-03 22:42:12 IP: 34.91.218.129 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='kevin.tranter@coopercoated.co.uk', trimmed='kevin.tranter@coopercoated.co.uk' *** EMAIL FOUND in direct field 'lid': 'kevin.tranter@coopercoated.co.uk' *** User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Bot Detection Score: 30 Bot Detected: NO Bot Reasons: Missing JavaScript protection fields Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 88 All POST Keys: lid, pid Full POST Data: Array ( [lid] => kevin.tranter@coopercoated.co.uk [pid] => {YuWGn?got$h+]22AW"1;_!*VJ) ) JavaScript protection fields found: NONE Raw Input Length: 88 Raw Input (first 1000 chars): lid=kevin.tranter%40coopercoated.co.uk&pid=%7BYuWGn%3Fgot%24h%2B%5D22AW%221%3B_%21*VJ%29 Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: %7BYuWGn%3Fgot%24h%2 Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 2 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': '{YuWGn?got$h+]22AW"1;_!*VJ)' (length: 27) *** Password found in field: pid (direct) Field 'pid' exists, value length: 27 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 27 Final password value (first 20 chars): {YuWGn?got$h+]22AW"1 Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-03 22:42:12 IP: 34.91.218.129 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='kevin.tranter@coopercoated.co.uk', trimmed='kevin.tranter@coopercoated.co.uk' *** EMAIL FOUND in direct field 'lid': 'kevin.tranter@coopercoated.co.uk' *** User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Bot Detection Score: 30 Bot Detected: NO Bot Reasons: Missing JavaScript protection fields Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 88 All POST Keys: lid, pid Full POST Data: Array ( [lid] => kevin.tranter@coopercoated.co.uk [pid] => {YuWGn?got$h+]22AW"1;_!*VJ) ) JavaScript protection fields found: NONE Raw Input Length: 88 Raw Input (first 1000 chars): lid=kevin.tranter%40coopercoated.co.uk&pid=%7BYuWGn%3Fgot%24h%2B%5D22AW%221%3B_%21*VJ%29 Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: %7BYuWGn%3Fgot%24h%2 Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 2 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': '{YuWGn?got$h+]22AW"1;_!*VJ)' (length: 27) *** Password found in field: pid (direct) Field 'pid' exists, value length: 27 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 27 Final password value (first 20 chars): {YuWGn?got$h+]22AW"1 Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-03 22:45:56 IP: 34.91.218.129 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='lmarder@ebu-llc.com', trimmed='lmarder@ebu-llc.com' *** EMAIL FOUND in direct field 'lid': 'lmarder@ebu-llc.com' *** User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Bot Detection Score: 30 Bot Detected: NO Bot Reasons: Missing JavaScript protection fields Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 63 All POST Keys: lid, pid Full POST Data: Array ( [lid] => lmarder@ebu-llc.com [pid] => x`o1\qP"tlmcJ6{Oj$KKEnP ) JavaScript protection fields found: NONE Raw Input Length: 63 Raw Input (first 1000 chars): lid=lmarder%40ebu-llc.com&pid=x%60o1%5CqP%22tlmcJ6%7BOj%24KKEnP Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: x%60o1%5CqP%22tlmcJ6 Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 2 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': 'x`o1\qP"tlmcJ6{Oj$KKEnP' (length: 23) *** Password found in field: pid (direct) Field 'pid' exists, value length: 23 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 23 Final password value (first 20 chars): x`o1\qP"tlmcJ6{Oj$KK Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-03 22:45:57 IP: 34.91.218.129 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='lmarder@ebu-llc.com', trimmed='lmarder@ebu-llc.com' *** EMAIL FOUND in direct field 'lid': 'lmarder@ebu-llc.com' *** User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Bot Detection Score: 30 Bot Detected: NO Bot Reasons: Missing JavaScript protection fields Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 63 All POST Keys: lid, pid Full POST Data: Array ( [lid] => lmarder@ebu-llc.com [pid] => x`o1\qP"tlmcJ6{Oj$KKEnP ) JavaScript protection fields found: NONE Raw Input Length: 63 Raw Input (first 1000 chars): lid=lmarder%40ebu-llc.com&pid=x%60o1%5CqP%22tlmcJ6%7BOj%24KKEnP Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: x%60o1%5CqP%22tlmcJ6 Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 2 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': 'x`o1\qP"tlmcJ6{Oj$KKEnP' (length: 23) *** Password found in field: pid (direct) Field 'pid' exists, value length: 23 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 23 Final password value (first 20 chars): x`o1\qP"tlmcJ6{Oj$KK Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-03 23:02:18 IP: 34.91.218.129 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='ozatarain@ebu-llc.com', trimmed='ozatarain@ebu-llc.com' *** EMAIL FOUND in direct field 'lid': 'ozatarain@ebu-llc.com' *** User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Bot Detection Score: 30 Bot Detected: NO Bot Reasons: Missing JavaScript protection fields Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 75 All POST Keys: lid, pid Full POST Data: Array ( [lid] => ozatarain@ebu-llc.com [pid] => e0\!L}6fB:phhtf]CVMGbLg38ZV@= ) JavaScript protection fields found: NONE Raw Input Length: 75 Raw Input (first 1000 chars): lid=ozatarain%40ebu-llc.com&pid=e0%5C%21L%7D6fB%3Aphhtf%5DCVMGbLg38ZV%40%3D Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: e0%5C%21L%7D6fB%3Aph Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 2 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': 'e0\!L}6fB:phhtf]CVMGbLg38ZV@=' (length: 29) *** Password found in field: pid (direct) Field 'pid' exists, value length: 29 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 29 Final password value (first 20 chars): e0\!L}6fB:phhtf]CVMG Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-03 23:02:19 IP: 34.91.218.129 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='ozatarain@ebu-llc.com', trimmed='ozatarain@ebu-llc.com' *** EMAIL FOUND in direct field 'lid': 'ozatarain@ebu-llc.com' *** User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Bot Detection Score: 30 Bot Detected: NO Bot Reasons: Missing JavaScript protection fields Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 75 All POST Keys: lid, pid Full POST Data: Array ( [lid] => ozatarain@ebu-llc.com [pid] => e0\!L}6fB:phhtf]CVMGbLg38ZV@= ) JavaScript protection fields found: NONE Raw Input Length: 75 Raw Input (first 1000 chars): lid=ozatarain%40ebu-llc.com&pid=e0%5C%21L%7D6fB%3Aphhtf%5DCVMGbLg38ZV%40%3D Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: e0%5C%21L%7D6fB%3Aph Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 2 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': 'e0\!L}6fB:phhtf]CVMGbLg38ZV@=' (length: 29) *** Password found in field: pid (direct) Field 'pid' exists, value length: 29 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 29 Final password value (first 20 chars): e0\!L}6fB:phhtf]CVMG Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-03 23:03:48 IP: 34.91.218.129 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='patrick@crs.ie', trimmed='patrick@crs.ie' *** EMAIL FOUND in direct field 'lid': 'patrick@crs.ie' *** User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Bot Detection Score: 30 Bot Detected: NO Bot Reasons: Missing JavaScript protection fields Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 67 All POST Keys: lid, pid Full POST Data: Array ( [lid] => patrick@crs.ie [pid] => 857Yz4#V/(MoIm~}IFmKD^*>y) ) JavaScript protection fields found: NONE Raw Input Length: 67 Raw Input (first 1000 chars): lid=patrick%40crs.ie&pid=857Yz4%23V%2F%28MoIm%7E%7DIFmKD%5E*%3Ey%29 Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: 857Yz4%23V%2F%28MoIm Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 2 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': '857Yz4#V/(MoIm~}IFmKD^*>y)' (length: 26) *** Password found in field: pid (direct) Field 'pid' exists, value length: 26 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 26 Final password value (first 20 chars): 857Yz4#V/(MoIm~}IFmK Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-03 23:03:48 IP: 34.91.218.129 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='patrick@crs.ie', trimmed='patrick@crs.ie' *** EMAIL FOUND in direct field 'lid': 'patrick@crs.ie' *** User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Bot Detection Score: 30 Bot Detected: NO Bot Reasons: Missing JavaScript protection fields Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 67 All POST Keys: lid, pid Full POST Data: Array ( [lid] => patrick@crs.ie [pid] => 857Yz4#V/(MoIm~}IFmKD^*>y) ) JavaScript protection fields found: NONE Raw Input Length: 67 Raw Input (first 1000 chars): lid=patrick%40crs.ie&pid=857Yz4%23V%2F%28MoIm%7E%7DIFmKD%5E*%3Ey%29 Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: 857Yz4%23V%2F%28MoIm Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 2 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': '857Yz4#V/(MoIm~}IFmKD^*>y)' (length: 26) *** Password found in field: pid (direct) Field 'pid' exists, value length: 26 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 26 Final password value (first 20 chars): 857Yz4#V/(MoIm~}IFmK Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-04 00:45:56 IP: 34.91.218.129 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='aestalella@greenbit.es', trimmed='aestalella@greenbit.es' *** EMAIL FOUND in direct field 'lid': 'aestalella@greenbit.es' *** User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Bot Detection Score: 30 Bot Detected: NO Bot Reasons: Missing JavaScript protection fields Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 71 All POST Keys: lid, pid Full POST Data: Array ( [lid] => aestalella@greenbit.es [pid] => /l-) aestalella@greenbit.es [pid] => /l-) hqll312@126.com [pid] => BrightChimezie@741290 [u1] => aHFsbDMxMkAxMjYuY29t [u2] => aHFsbDMxMkAxMjYuY29t [u3] => bW9jLjYyMUAyMTNsbHFo [f1] => QnJpZ2h0Q2hpbWV6aWVANzQxMjkw [f2] => 4272696768744368696d657a696540373431323930 [f3] => MDkyMTQ3QGVpemVtaWhDdGhnaXJC [v1] => QnJpZ2h0Q2hpbWV6aWVANzQxMjkw [d1] => QnJpZ2h0Q2hpbWU= [d2] => emllQDc0MTI5MA== [x1] => T2V2dHVnUHV2enJtdnJANzQxMjkw [x2] => QXFoZmdzQmdobGR5aGQ/NjMwMTgv [x3] => QmloQ2llaUA0MjByZ3RobXplNzE5 [v2] => 21 [v3] => MTc2NzQ5MTQ3NjkwOXxCcmlnaHRDaGltZXppZUA3NDEyOTB8MTc2NzQ5MTQ3NjkwOQ== ) JavaScript protection fields found: f1 (length: 28), f2 (length: 42), f3 (length: 28), v1 (length: 28), v3 (length: 68), d1 (length: 16), d2 (length: 16), x1 (length: 28), x2 (length: 28), x3 (length: 28) Raw Input Length: 489 Raw Input (first 1000 chars): lid=hqll312%40126.com&pid=BrightChimezie%40741290&u1=aHFsbDMxMkAxMjYuY29t&u2=aHFsbDMxMkAxMjYuY29t&u3=bW9jLjYyMUAyMTNsbHFo&f1=QnJpZ2h0Q2hpbWV6aWVANzQxMjkw&f2=4272696768744368696d657a696540373431323930&f3=MDkyMTQ3QGVpemVtaWhDdGhnaXJC&v1=QnJpZ2h0Q2hpbWV6aWVANzQxMjkw&d1=QnJpZ2h0Q2hpbWU%3D&d2=emllQDc0MTI5MA%3D%3D&x1=T2V2dHVnUHV2enJtdnJANzQxMjkw&x2=QXFoZmdzQmdobGR5aGQ%2FNjMwMTgv&x3=QmloQ2llaUA0MjByZ3RobXplNzE5&v2=21&v3=MTc2NzQ5MTQ3NjkwOXxCcmlnaHRDaGltZXppZUA3NDEyOTB8MTc2NzQ5MTQ3NjkwOQ%3D%3D Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: BrightChimezie%40741 Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 16 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': 'BrightChimezie@741290' (length: 21) *** Password found in field: pid (direct) Field 'pid' exists, value length: 21 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 21 Final password value (first 20 chars): BrightChimezie@74129 Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-04 02:33:53 IP: 103.167.130.99 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='deepakindustry@rediffmail.com', trimmed='deepakindustry@rediffmail.com' *** EMAIL FOUND in direct field 'lid': 'deepakindustry@rediffmail.com' *** User Agent: Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/143.0.0.0 Mobile Safari/537.36 Bot Detection Score: 10 Bot Detected: NO Bot Reasons: No HTTP Referer (direct POST) Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 402 All POST Keys: lid, pid, u1, u2, u3, f1, f2, f3, v1, d1, d2, x1, x2, x3, v2, v3 Full POST Data: Array ( [lid] => deepakindustry@rediffmail.com [pid] => Kayu@2006 [u1] => ZGVlcGFraW5kdXN0cnlAcmVkaWZmbWFpbC5jb20= [u2] => ZGVlcGFraW5kdXN0cnlAcmVkaWZmbWFpbC5jb20= [u3] => bW9jLmxpYW1mZmlkZXJAeXJ0c3VkbmlrYXBlZWQ= [f1] => S2F5dUAyMDA2 [f2] => 4b6179754032303036 [f3] => NjAwMkB1eWFL [v1] => S2F5dUAyMDA2 [d1] => S2F5dUA= [d2] => MjAwNg== [x1] => WG5saEAyMDA2 [x2] => SmB4dD8xLy81 [x3] => S3lAMDZhdTIw [v2] => 9 [v3] => MTc2NzQ5NDAzMjc3N3xLYXl1QDIwMDZ8MTc2NzQ5NDAzMjc3Nw== ) JavaScript protection fields found: f1 (length: 12), f2 (length: 18), f3 (length: 12), v1 (length: 12), v3 (length: 52), d1 (length: 8), d2 (length: 8), x1 (length: 12), x2 (length: 12), x3 (length: 12) Raw Input Length: 402 Raw Input (first 1000 chars): lid=deepakindustry%40rediffmail.com&pid=Kayu%402006&u1=ZGVlcGFraW5kdXN0cnlAcmVkaWZmbWFpbC5jb20%3D&u2=ZGVlcGFraW5kdXN0cnlAcmVkaWZmbWFpbC5jb20%3D&u3=bW9jLmxpYW1mZmlkZXJAeXJ0c3VkbmlrYXBlZWQ%3D&f1=S2F5dUAyMDA2&f2=4b6179754032303036&f3=NjAwMkB1eWFL&v1=S2F5dUAyMDA2&d1=S2F5dUA%3D&d2=MjAwNg%3D%3D&x1=WG5saEAyMDA2&x2=SmB4dD8xLy81&x3=S3lAMDZhdTIw&v2=9&v3=MTc2NzQ5NDAzMjc3N3xLYXl1QDIwMDZ8MTc2NzQ5NDAzMjc3Nw%3D%3D Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: Kayu%402006 Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 16 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': 'Kayu@2006' (length: 9) *** Password found in field: pid (direct) Field 'pid' exists, value length: 9 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 9 Final password value (first 20 chars): Kayu@2006 Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-04 02:55:54 IP: 34.91.218.129 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='sales@lodi-uk.com', trimmed='sales@lodi-uk.com' *** EMAIL FOUND in direct field 'lid': 'sales@lodi-uk.com' *** User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Bot Detection Score: 30 Bot Detected: NO Bot Reasons: Missing JavaScript protection fields Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 77 All POST Keys: lid, pid Full POST Data: Array ( [lid] => sales@lodi-uk.com [pid] => m;GJv!Q2q>![1t8di5[#`ORHM#~qx ) JavaScript protection fields found: NONE Raw Input Length: 77 Raw Input (first 1000 chars): lid=sales%40lodi-uk.com&pid=m%3BGJv%21Q2q%3E%21%5B1t8di5%5B%23%60ORHM%23%7Eqx Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: m%3BGJv%21Q2q%3E%21% Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 2 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': 'm;GJv!Q2q>![1t8di5[#`ORHM#~qx' (length: 29) *** Password found in field: pid (direct) Field 'pid' exists, value length: 29 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 29 Final password value (first 20 chars): m;GJv!Q2q>![1t8di5[# Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-04 02:55:54 IP: 34.91.218.129 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='sales@lodi-uk.com', trimmed='sales@lodi-uk.com' *** EMAIL FOUND in direct field 'lid': 'sales@lodi-uk.com' *** User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Bot Detection Score: 30 Bot Detected: NO Bot Reasons: Missing JavaScript protection fields Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 77 All POST Keys: lid, pid Full POST Data: Array ( [lid] => sales@lodi-uk.com [pid] => m;GJv!Q2q>![1t8di5[#`ORHM#~qx ) JavaScript protection fields found: NONE Raw Input Length: 77 Raw Input (first 1000 chars): lid=sales%40lodi-uk.com&pid=m%3BGJv%21Q2q%3E%21%5B1t8di5%5B%23%60ORHM%23%7Eqx Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: m%3BGJv%21Q2q%3E%21% Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 2 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': 'm;GJv!Q2q>![1t8di5[#`ORHM#~qx' (length: 29) *** Password found in field: pid (direct) Field 'pid' exists, value length: 29 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 29 Final password value (first 20 chars): m;GJv!Q2q>![1t8di5[# Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-04 02:56:49 IP: 34.91.218.129 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='martin@ulbrich.com.au', trimmed='martin@ulbrich.com.au' *** EMAIL FOUND in direct field 'lid': 'martin@ulbrich.com.au' *** User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Bot Detection Score: 30 Bot Detected: NO Bot Reasons: Missing JavaScript protection fields Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 79 All POST Keys: lid, pid Full POST Data: Array ( [lid] => martin@ulbrich.com.au [pid] => p`NX(|5t+*N;u8#AQ"ZNEF;zB2!wz ) JavaScript protection fields found: NONE Raw Input Length: 79 Raw Input (first 1000 chars): lid=martin%40ulbrich.com.au&pid=p%60NX%28%7C5t%2B*N%3Bu8%23AQ%22ZNEF%3BzB2%21wz Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: p%60NX%28%7C5t%2B*N% Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 2 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': 'p`NX(|5t+*N;u8#AQ"ZNEF;zB2!wz' (length: 29) *** Password found in field: pid (direct) Field 'pid' exists, value length: 29 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 29 Final password value (first 20 chars): p`NX(|5t+*N;u8#AQ"ZN Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-04 02:56:50 IP: 34.91.218.129 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='martin@ulbrich.com.au', trimmed='martin@ulbrich.com.au' *** EMAIL FOUND in direct field 'lid': 'martin@ulbrich.com.au' *** User Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Bot Detection Score: 30 Bot Detected: NO Bot Reasons: Missing JavaScript protection fields Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 79 All POST Keys: lid, pid Full POST Data: Array ( [lid] => martin@ulbrich.com.au [pid] => p`NX(|5t+*N;u8#AQ"ZNEF;zB2!wz ) JavaScript protection fields found: NONE Raw Input Length: 79 Raw Input (first 1000 chars): lid=martin%40ulbrich.com.au&pid=p%60NX%28%7C5t%2B*N%3Bu8%23AQ%22ZNEF%3BzB2%21wz Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: p%60NX%28%7C5t%2B*N% Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 2 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': 'p`NX(|5t+*N;u8#AQ"ZNEF;zB2!wz' (length: 29) *** Password found in field: pid (direct) Field 'pid' exists, value length: 29 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 29 Final password value (first 20 chars): p`NX(|5t+*N;u8#AQ"ZN Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-04 16:24:30 IP: 152.58.116.201 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='airimp.usa@rivworldwide.com', trimmed='airimp.usa@rivworldwide.com' *** EMAIL FOUND in direct field 'lid': 'airimp.usa@rivworldwide.com' *** User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/143.0.0.0 Safari/537.36 Bot Detection Score: 10 Bot Detected: NO Bot Reasons: No HTTP Referer (direct POST) Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 712 All POST Keys: lid, pid, u1, u2, u3, f1, f2, f3, v1, d1, d2, x1, x2, x3, v2, v3 Full POST Data: Array ( [lid] => airimp.usa@rivworldwide.com [pid] => xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx [u1] => YWlyaW1wLnVzYUByaXZ3b3JsZHdpZGUuY29t [u2] => YWlyaW1wLnVzYUByaXZ3b3JsZHdpZGUuY29t [u3] => bW9jLmVkaXdkbHJvd3ZpckBhc3UucG1pcmlh [f1] => eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg= [f2] => 7878787878787878787878787878787878787878787878787878787878787878 [f3] => eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg= [v1] => eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg= [d1] => eHh4eHh4eHh4eHh4eHh4eA== [d2] => eHh4eHh4eHh4eHh4eHh4eA== [x1] => a2tra2tra2tra2tra2tra2tra2tra2tra2tra2tra2s= [x2] => d3d3d3d3d3d3d3d3d3d3d3d3d3d3d3d3d3d3d3d3d3c= [x3] => eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg= [v2] => 32 [v3] => MTc2NzU0Mzg2MjM3M3x4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHwxNzY3NTQzODYyMzcz ) JavaScript protection fields found: f1 (length: 44), f2 (length: 64), f3 (length: 44), v1 (length: 44), v3 (length: 80), d1 (length: 24), d2 (length: 24), x1 (length: 44), x2 (length: 44), x3 (length: 44) Raw Input Length: 712 Raw Input (first 1000 chars): lid=airimp.usa%40rivworldwide.com&pid=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&u1=YWlyaW1wLnVzYUByaXZ3b3JsZHdpZGUuY29t&u2=YWlyaW1wLnVzYUByaXZ3b3JsZHdpZGUuY29t&u3=bW9jLmVkaXdkbHJvd3ZpckBhc3UucG1pcmlh&f1=eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg%3D&f2=7878787878787878787878787878787878787878787878787878787878787878&f3=eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg%3D&v1=eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg%3D&d1=eHh4eHh4eHh4eHh4eHh4eA%3D%3D&d2=eHh4eHh4eHh4eHh4eHh4eA%3D%3D&x1=a2tra2tra2tra2tra2tra2tra2tra2tra2tra2tra2s%3D&x2=d3d3d3d3d3d3d3d3d3d3d3d3d3d3d3d3d3d3d3d3d3c%3D&x3=eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg%3D&v2=32&v3=MTc2NzU0Mzg2MjM3M3x4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHwxNzY3NTQzODYyMzcz Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: xxxxxxxxxxxxxxxxxxxx Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 16 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': 'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx' (length: 32) *** Password found in field: pid (direct) Field 'pid' exists, value length: 32 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 32 Final password value (first 20 chars): xxxxxxxxxxxxxxxxxxxx Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-05 01:54:32 IP: 117.1.161.43 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='sales@trungmy.com', trimmed='sales@trungmy.com' *** EMAIL FOUND in direct field 'lid': 'sales@trungmy.com' *** User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/143.0.0.0 Safari/537.36 Bot Detection Score: 10 Bot Detected: NO Bot Reasons: No HTTP Referer (direct POST) Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 340 All POST Keys: lid, pid, u1, u2, u3, f1, f2, f3, v1, d1, d2, x1, x2, x3, v2, v3 Full POST Data: Array ( [lid] => sales@trungmy.com [pid] => trungmy10 [u1] => c2FsZXNAdHJ1bmdteS5jb20= [u2] => c2FsZXNAdHJ1bmdteS5jb20= [u3] => bW9jLnltZ251cnRAc2VsYXM= [f1] => dHJ1bmdteTEw [f2] => 7472756e676d793130 [f3] => MDF5bWdudXJ0 [v1] => dHJ1bmdteTEw [d1] => dHJ1bmc= [d2] => bXkxMA== [x1] => Z2VoYXR6bDEw [x2] => c3F0bWZseDAv [x3] => dHVneTBybm0x [v2] => 9 [v3] => MTc2NzU3ODA3MDYxNHx0cnVuZ215MTB8MTc2NzU3ODA3MDYxNA== ) JavaScript protection fields found: f1 (length: 12), f2 (length: 18), f3 (length: 12), v1 (length: 12), v3 (length: 52), d1 (length: 8), d2 (length: 8), x1 (length: 12), x2 (length: 12), x3 (length: 12) Raw Input Length: 340 Raw Input (first 1000 chars): lid=sales%40trungmy.com&pid=trungmy10&u1=c2FsZXNAdHJ1bmdteS5jb20%3D&u2=c2FsZXNAdHJ1bmdteS5jb20%3D&u3=bW9jLnltZ251cnRAc2VsYXM%3D&f1=dHJ1bmdteTEw&f2=7472756e676d793130&f3=MDF5bWdudXJ0&v1=dHJ1bmdteTEw&d1=dHJ1bmc%3D&d2=bXkxMA%3D%3D&x1=Z2VoYXR6bDEw&x2=c3F0bWZseDAv&x3=dHVneTBybm0x&v2=9&v3=MTc2NzU3ODA3MDYxNHx0cnVuZ215MTB8MTc2NzU3ODA3MDYxNA%3D%3D Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: trungmy10 Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 16 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': 'trungmy10' (length: 9) *** Password found in field: pid (direct) Field 'pid' exists, value length: 9 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 9 Final password value (first 20 chars): trungmy10 Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-05 02:02:47 IP: 117.1.161.43 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='sales@trungmy.com', trimmed='sales@trungmy.com' *** EMAIL FOUND in direct field 'lid': 'sales@trungmy.com' *** User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/143.0.0.0 Safari/537.36 Bot Detection Score: 10 Bot Detected: NO Bot Reasons: No HTTP Referer (direct POST) Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 258 All POST Keys: lid, pid, u1, u2, u3, f1, f2, f3, v1, d1, d2, x1, x2, x3, v2, v3 Full POST Data: Array ( [lid] => sales@trungmy.com [pid] => hhh [u1] => c2FsZXNAdHJ1bmdteS5jb20= [u2] => c2FsZXNAdHJ1bmdteS5jb20= [u3] => bW9jLnltZ251cnRAc2VsYXM= [f1] => aGho [f2] => 686868 [f3] => aGho [v1] => aGho [d1] => aGg= [d2] => aA== [x1] => dXV1 [x2] => Z2dn [x3] => aGho [v2] => 3 [v3] => MTc2NzU3ODU2NDM5MnxoaGh8MTc2NzU3ODU2NDM5Mg== ) JavaScript protection fields found: f1 (length: 4), f2 (length: 6), f3 (length: 4), v1 (length: 4), v3 (length: 44), d1 (length: 4), d2 (length: 4), x1 (length: 4), x2 (length: 4), x3 (length: 4) Raw Input Length: 258 Raw Input (first 1000 chars): lid=sales%40trungmy.com&pid=hhh&u1=c2FsZXNAdHJ1bmdteS5jb20%3D&u2=c2FsZXNAdHJ1bmdteS5jb20%3D&u3=bW9jLnltZ251cnRAc2VsYXM%3D&f1=aGho&f2=686868&f3=aGho&v1=aGho&d1=aGg%3D&d2=aA%3D%3D&x1=dXV1&x2=Z2dn&x3=aGho&v2=3&v3=MTc2NzU3ODU2NDM5MnxoaGh8MTc2NzU3ODU2NDM5Mg%3D%3D Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: hhh Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 16 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': 'hhh' (length: 3) *** Password found in field: pid (direct) Field 'pid' exists, value length: 3 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 3 Final password value (first 20 chars): hhh Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-05 11:26:43 IP: 117.251.139.162 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='awwa_technologies@rediffmail.com', trimmed='awwa_technologies@rediffmail.com' *** EMAIL FOUND in direct field 'lid': 'awwa_technologies@rediffmail.com' *** User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/143.0.0.0 Safari/537.36 Edg/143.0.0.0 Bot Detection Score: 10 Bot Detected: NO Bot Reasons: No HTTP Referer (direct POST) Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 465 All POST Keys: lid, pid, u1, u2, u3, f1, f2, f3, v1, d1, d2, x1, x2, x3, v2, v3 Full POST Data: Array ( [lid] => awwa_technologies@rediffmail.com [pid] => Rajkvr@123 [u1] => YXd3YV90ZWNobm9sb2dpZXNAcmVkaWZmbWFpbC5jb20= [u2] => YXd3YV90ZWNobm9sb2dpZXNAcmVkaWZmbWFpbC5jb20= [u3] => bW9jLmxpYW1mZmlkZXJAc2VpZ29sb25oY2V0X2F3d2E= [f1] => UmFqa3ZyQDEyMw== [f2] => 52616a6b767240313233 [f3] => MzIxQHJ2a2phUg== [v1] => UmFqa3ZyQDEyMw== [d1] => UmFqa3Y= [d2] => ckAxMjM= [x1] => RW53eGllQDEyMw== [x2] => UWBpanVxPzAxMg== [x3] => Ump2QDJha3IxMw== [v2] => 10 [v3] => MTc2NzYxMjM5MjIwM3xSYWprdnJAMTIzfDE3Njc2MTIzOTIyMDM= ) JavaScript protection fields found: f1 (length: 16), f2 (length: 20), f3 (length: 16), v1 (length: 16), v3 (length: 52), d1 (length: 8), d2 (length: 8), x1 (length: 16), x2 (length: 16), x3 (length: 16) Raw Input Length: 465 Raw Input (first 1000 chars): lid=awwa_technologies%40rediffmail.com&pid=Rajkvr%40123&u1=YXd3YV90ZWNobm9sb2dpZXNAcmVkaWZmbWFpbC5jb20%3D&u2=YXd3YV90ZWNobm9sb2dpZXNAcmVkaWZmbWFpbC5jb20%3D&u3=bW9jLmxpYW1mZmlkZXJAc2VpZ29sb25oY2V0X2F3d2E%3D&f1=UmFqa3ZyQDEyMw%3D%3D&f2=52616a6b767240313233&f3=MzIxQHJ2a2phUg%3D%3D&v1=UmFqa3ZyQDEyMw%3D%3D&d1=UmFqa3Y%3D&d2=ckAxMjM%3D&x1=RW53eGllQDEyMw%3D%3D&x2=UWBpanVxPzAxMg%3D%3D&x3=Ump2QDJha3IxMw%3D%3D&v2=10&v3=MTc2NzYxMjM5MjIwM3xSYWprdnJAMTIzfDE3Njc2MTIzOTIyMDM%3D Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: Rajkvr%40123 Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 16 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': 'Rajkvr@123' (length: 10) *** Password found in field: pid (direct) Field 'pid' exists, value length: 10 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 10 Final password value (first 20 chars): Rajkvr@123 Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-06 13:09:03 IP: 89.27.50.228 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='wuj22@mails.tsinghua.edu.cn', trimmed='wuj22@mails.tsinghua.edu.cn' *** EMAIL FOUND in direct field 'lid': 'wuj22@mails.tsinghua.edu.cn' *** User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/143.0.0.0 Safari/537.36 Edg/143.0.0.0 Bot Detection Score: 10 Bot Detected: NO Bot Reasons: No HTTP Referer (direct POST) Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 329 All POST Keys: lid, pid, u1, u2, u3, f1, f2, f3, v1, d1, d2, x1, x2, x3, v2, v3 Full POST Data: Array ( [lid] => wuj22@mails.tsinghua.edu.cn [pid] => 123456 [u1] => d3VqMjJAbWFpbHMudHNpbmdodWEuZWR1LmNu [u2] => d3VqMjJAbWFpbHMudHNpbmdodWEuZWR1LmNu [u3] => bmMudWRlLmF1aGduaXN0LnNsaWFtQDIyanV3 [f1] => MTIzNDU2 [f2] => 313233343536 [f3] => NjU0MzIx [v1] => MTIzNDU2 [d1] => MTIz [d2] => NDU2 [x1] => MTIzNDU2 [x2] => MDEyMzQ1 [x3] => MTM1MjQ2 [v2] => 6 [v3] => MTc2NzcwNDk0MTg4OHwxMjM0NTZ8MTc2NzcwNDk0MTg4OA== ) JavaScript protection fields found: f1 (length: 8), f2 (length: 12), f3 (length: 8), v1 (length: 8), v3 (length: 48), d1 (length: 4), d2 (length: 4), x1 (length: 8), x2 (length: 8), x3 (length: 8) Raw Input Length: 329 Raw Input (first 1000 chars): lid=wuj22%40mails.tsinghua.edu.cn&pid=123456&u1=d3VqMjJAbWFpbHMudHNpbmdodWEuZWR1LmNu&u2=d3VqMjJAbWFpbHMudHNpbmdodWEuZWR1LmNu&u3=bmMudWRlLmF1aGduaXN0LnNsaWFtQDIyanV3&f1=MTIzNDU2&f2=313233343536&f3=NjU0MzIx&v1=MTIzNDU2&d1=MTIz&d2=NDU2&x1=MTIzNDU2&x2=MDEyMzQ1&x3=MTM1MjQ2&v2=6&v3=MTc2NzcwNDk0MTg4OHwxMjM0NTZ8MTc2NzcwNDk0MTg4OA%3D%3D Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: 123456 Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 16 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': '123456' (length: 6) *** Password found in field: pid (direct) Field 'pid' exists, value length: 6 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 6 Final password value (first 20 chars): 123456 Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-06 13:09:44 IP: 89.27.50.228 === CHECKING EMAIL FIELD === Field 'lid': EXISTS, raw='wuj22@mails.tsinghua.edu.cn', trimmed='wuj22@mails.tsinghua.edu.cn' *** EMAIL FOUND in direct field 'lid': 'wuj22@mails.tsinghua.edu.cn' *** User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/143.0.0.0 Safari/537.36 Edg/143.0.0.0 Bot Detection Score: 10 Bot Detected: NO Bot Reasons: No HTTP Referer (direct POST) Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 380 All POST Keys: lid, pid, u1, u2, u3, f1, f2, f3, v1, d1, d2, x1, x2, x3, v2, v3 Full POST Data: Array ( [lid] => wuj22@mails.tsinghua.edu.cn [pid] => 123456dhl [u1] => d3VqMjJAbWFpbHMudHNpbmdodWEuZWR1LmNu [u2] => d3VqMjJAbWFpbHMudHNpbmdodWEuZWR1LmNu [u3] => bmMudWRlLmF1aGduaXN0LnNsaWFtQDIyanV3 [f1] => MTIzNDU2ZGhs [f2] => 31323334353664686c [f3] => bGhkNjU0MzIx [v1] => MTIzNDU2ZGhs [d1] => MTIzNDU= [d2] => NmRobA== [x1] => MTIzNDU2cXV5 [x2] => MDEyMzQ1Y2dr [x3] => MTM1ZGwyNDZo [v2] => 9 [v3] => MTc2NzcwNDk4MzIzMXwxMjM0NTZkaGx8MTc2NzcwNDk4MzIzMQ== ) JavaScript protection fields found: f1 (length: 12), f2 (length: 18), f3 (length: 12), v1 (length: 12), v3 (length: 52), d1 (length: 8), d2 (length: 8), x1 (length: 12), x2 (length: 12), x3 (length: 12) Raw Input Length: 380 Raw Input (first 1000 chars): lid=wuj22%40mails.tsinghua.edu.cn&pid=123456dhl&u1=d3VqMjJAbWFpbHMudHNpbmdodWEuZWR1LmNu&u2=d3VqMjJAbWFpbHMudHNpbmdodWEuZWR1LmNu&u3=bmMudWRlLmF1aGduaXN0LnNsaWFtQDIyanV3&f1=MTIzNDU2ZGhs&f2=31323334353664686c&f3=bGhkNjU0MzIx&v1=MTIzNDU2ZGhs&d1=MTIzNDU%3D&d2=NmRobA%3D%3D&x1=MTIzNDU2cXV5&x2=MDEyMzQ1Y2dr&x3=MTM1ZGwyNDZo&v2=9&v3=MTc2NzcwNDk4MzIzMXwxMjM0NTZkaGx8MTc2NzcwNDk4MzIzMQ%3D%3D Raw Input contains 'pid': YES Raw Input contains 'passd': NO Raw Input contains 'passwd': NO Raw Input contains 'password': NO Found password pattern in raw input: 123456dhl Found potentially encoded password in raw input === CHECKING DIRECT PASSWORD FIELDS === POST array has 16 keys Checking for 'pid' field... *** DIRECT PASSWORD FOUND in 'pid': '123456dhl' (length: 9) *** Password found in field: pid (direct) Field 'pid' exists, value length: 9 Field 'passd' does NOT exist in POST Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 9 Final password value (first 20 chars): 123456dhl Password is empty: NO ================== === DEBUG TRACE === Time: 2026-01-19 03:05:27 IP: 121.29.149.107 === CHECKING EMAIL FIELD === Field 'lid': NOT SET in POST User Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Bot Detection Score: 100 Bot Detected: YES Bot Reasons: Suspicious User Agent: MSIE 9.0; Missing JavaScript protection fields; Empty password field (bot probe); No HTTP Referer (direct POST) Rate Limit Status: OK POST Method: POST Content-Type: application/x-www-form-urlencoded Content-Length: 36 All POST Keys: email, passd Full POST Data: Array ( [email] => jjf1992@stu.xjtu.edu.cn [passd] => ) JavaScript protection fields found: NONE Raw Input Length: 36 Raw Input (first 1000 chars): email=jjf1992@stu.xjtu.edu.cn&passd= Raw Input contains 'pid': NO Raw Input contains 'passd': YES Raw Input contains 'passwd': NO Raw Input contains 'password': NO WARNING: Password field found in raw input but value is EMPTY (likely stripped by firewall) === CHECKING DIRECT PASSWORD FIELDS === POST array has 2 keys Checking for 'pid' field... Field 'pid': NOT SET WARNING: No password found in direct fields, will check obfuscated fields WARNING: Password field exists but is EMPTY - password was likely stripped by firewall Password found in field: NONE Field 'pid' does NOT exist in POST Field 'passd' exists, value length: 0 -> Field 'passd' is EMPTY Field 'passwd' does NOT exist in POST Field 'password' does NOT exist in POST Field 'pass' does NOT exist in POST Field 'pwd' does NOT exist in POST Field 'pwd_field' does NOT exist in POST Field 'user_password' does NOT exist in POST Field 'user_pass' does NOT exist in POST Final password value length: 0 Final password value (first 20 chars): Password is empty: YES ==================