Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.71 Safari/537.36
How would I go about blocking that?
lucy24
5:38 am on Feb 16, 2014 (gmt 0)
What the bleep? Can you post the whole log entry? First and last, if there were multiples. I thought IP obfuscation was well-night impossible. Are you positive it wasn't a glitch in your own server?
phranque
10:54 am on Feb 16, 2014 (gmt 0)
you can hide the originating IP behind a proxy/gateway/tor/etc but if the final non-obfuscated IP is spoofed it cannot be used to successfully complete a TCP connection handshake sequence unless you have control of the network.
lucy24
11:24 am on Feb 16, 2014 (gmt 0)
unless you have control of the network
phranque, was that the www equivalent of The phone call is coming from inside your own house? :)
wilderness
1:08 pm on Feb 16, 2014 (gmt 0)
The DOT is simply a PHP hiccup from the software that serves the logs. It also happens occasionally with a dash-hyphen, or even an incomplete line.
EastTexas
9:47 pm on Feb 16, 2014 (gmt 0)
I should have looked at the logs before posting...
The ip is ovh.ca/ovh.net It's a pest that sends lots of bots to my site.
ns4009583.ip-192-99-9.net - - [16/Feb/2014:14:55:30 -0600] "GET / HTTP/1.1" 200 4103 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/27.0.1453.110 Safari/537.36"