Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
PostPosted: Tue Sep 04, 2012 8:17 pm 
Offline
Newbie

Joined: Tue Sep 04, 2012 8:08 pm
Posts: 2
Hi,

I set up a coming soon page for my website until I go live so that I can see what type of traffic just arrives to my URL and what automated attacks I have to deal with.

I don't understand what these 2 bunches of requests are trying to do. They are very basic to protect against, I can just reject any traffic from any host that is not my own but they seem so stupid.
Are they trying to do denial of service attacks on these banks? How would that even work?

{"ip":"65.111.177.188","date":1346787914759,"method":"GET","url":"/","host":"www.itau.com.br","user-agent":"Mozilla/5.0 (Windows NT 5.1)
AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.56 Safari/535.11"}
{"ip":"65.111.177.188","date":1346787914866,"method":"GET","url":"/","host":"www.bradesco.com.br","user-agent":"Mozilla/5.0 (Windows NT 5.1) AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.56 Safari/535.11"}
{"ip":"65.111.177.188","date":1346787914964,"method":"GET","url":"/","host":"www.bb.com.br","user-agent":"Mozilla/5.0 (Windows NT 5.1) AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.56 Safari/535.11"}

And for this request?
{"ip":"87.98.134.243","date":1346790766009,"method":"GET","url":"/?q=node/2","host":"rhs-drupal.imagistic.com","user-agent":"Mozilla/5.0
(Windows NT 6.0; WOW64; rv:13.0) Gecko/20100101 Firefox/13.0.1","accept":"image/gif, image/jpeg, image/pjpeg, application/x-ms-application, application/vnd.ms xpsdocument, application/xaml+xml, application/x-ms-xbap, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, application/x-shockwave-flash, */*"}

Thanks.


Top
   
PostPosted: Thu Sep 06, 2012 8:24 pm 
Offline
Senior Member
User avatar

Joined: Tue May 26, 2009 3:29 pm
Posts: 1691
Location: Montreal, QC
Scanning for open proxies. If you were running an open proxy, your server would fetch the requested URLs and return it to the client. Once having confirmed the presence of an open proxy, they would use it for DDoS attacks, sending spam, etc.


Top
   
PostPosted: Sun Sep 09, 2012 9:35 pm 
Offline
Newbie

Joined: Tue Sep 04, 2012 8:08 pm
Posts: 2
Thanks, it makes sense!


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: No registered users and 2 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group