Forum Moderators: phranque
"GET /favicon.ico HTTP/1.1" 200 206 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.0.3705; MSN 9.0;MSN 9.1; MSNbVZ02; MSNmen-us; MSNcOTH; MPLUS)"
bash-2.04$ host 151.205.151.98
98.151.205.151.in-addr.arpa. domain name pointer pool-151-205-151-98.hag.east.verizon.net.
bash-2.04$ whois -h whois.arin.net 151.205.151.98
Verizon Internet Services VIS-151-196 (NET-151-196-0-0-1)
151.196.0.0 - 151.205.255.255
Verizon Internet Services VZ-DSLDIAL-HGTWPA-1 (NET-151-205-140-0-1)
151.205.140.0 - 151.205.155.255
(note that you could also get this info from GeekTools (among other places); [geektools.com ].
Looks like Verizon DSL IPs. A Google search ([google.com ]) on 'favicon.ico' should tell you what that file is. Honestly, I'd just ignore them. 7 lines in your logs doesn't mean a whole helluva lot. =)
The problem is that there's no easy way to know *for sure* what's going on, since the only data you have to work with is the data that's being sent by the client. They could, for instance, be spoofing the user-agent. Far be it from me to discourage digging and finding the answer, so if you want to dig, please do; random curiosity is what keeps us in this game. =)
(This is fancy way of saying "I don't know, and in my day job, I don't have the time to care unless I'm seeing thousands of these requests in a short period of time, all day, every day). Note that if it's an issue, you can set up a <Location> block to deny access to that file, or simply block the IPs in the kernel or at the switch/router (depending on your environment).