Forum Moderators: open
PHP
194.109.193.** - - [06/Sep/2005:22:48:25 +0000] "HEAD http://www.example.com/gallery/avatars/example.gif HTTP/1.1" 200 0 "-" "-"
194.109.193.** - - [06/Sep/2005:22:48:26 +0000] "GET /gallery/avatars/example.gif HTTP/1.0" 200 11670 "-" "PHP"
No UA with a HEAD sent to images coming from this and two other IPs. Anyone else? I've had this thing visiting me for a couple months now.
PS - Sorry if I'm driving any mods crazy...I never really posted bots here before. :)
[edited by: volatilegx at 8:30 pm (utc) on Sep. 18, 2005]
[edited by: Woz at 12:13 am (utc) on Sep. 19, 2005]
[edit reason] obscured IP address & examplified code [/edit]
This is a frequent visitor. PHP is the user agent. There is no referrer. It requests the same .asp file every time it visits. Is this what you were looking for?
I need to add a disclaimer of sorts. PHP recommends one of my sites as the authoritative source for a specific file so I get a lot of user agents with PHP in them, and a lot of referrers from official PHP sites.
The ua I see most often with PHP in it is PHP/4.1.2 and it requests the same file as above.
I've looked up the ips of these agents and they all get red listed! From what I've seen they also seem to be preceded (at least from the instances I've just looked up) by a blank useragent.
Virus writers will often create a virus named as an os specific file to add confusion with scanners and people looking to clean them out. It does not surprise me the scum terrorists of the internet would use the same tactics in useragents for goodness sakes!
New Rule - If someone is accessing my website clientside and are a serverside technology they can go to hell.
Of course, where will the cowards operate next? Where do the wars of the 21st century operate? Load up! We're going in to town! ;)
I've looked up the ips of these agents and they all get red listed!
Load up! We're going in to town!
You can use sites like dnsstuff for abuseip lookups. :)