Welcome! Log In Create A New Profile


Hacker log

October 22, 2016 05:22PM

If you need an extensive list of hacker requests (over 200), I put this
log entry on pastebin. As mentioned at the top of the pastebin, the
hacker used my IP address directly rather than my doman name.

I have a "map" that detects typical hacker activity. Perhaps in my "map"
of triggers, I should look for bypassing the domain name, that is
requests directly to my IP address. There is nothing particularly evil
in using my IP address rather than domain name, but would any real user
ever use my IP address? Kind of doubtful.

nginx mailing list
Subject Author Posted

Hacker log

gariac October 22, 2016 05:22PM

Re: Hacker log

itpp2012 October 22, 2016 05:40PM

Re: Hacker log

gariac October 22, 2016 06:18PM

Sorry, only registered users may post in this forum.

Click here to login

Online Users

Guests: 70
Record Number of Users: 8 on April 13, 2023
Record Number of Guests: 421 on December 02, 2018
Powered by nginx      Powered by FreeBSD      PHP Powered      Powered by MariaDB      ipv6 ready