Forum Moderators: open
cpe-75-185-223-nnn.woh.res.rr.com
cz32ts
14:57:26 /?id=1011&display=photo[yada-yada]
14:57:26 /?id=1011&display=photo[yada-yada]
static-69-201-230-nn.ipcom.comunitel.net
cz32ts
14:57:27 /?display=photo&id=1011[yada-yada]
14:57:27 /?display=photo&id=1011[yada-yada]
(Curiously, the site hit had a PHP photo display script but when the site transferred to me/my server, I removed all traces. The only place you can still find URLs with display=photo -- different id-- are in Bing's SERPS... even after 404'ing the pages for six months.)
If you don't already rewrite SQL injection scripts, check out Jim Morgan's posts in: How can I block blind SQL injection attack? [webmasterworld.com]
FWIW: If you Google the following pair, you'll find more info about cz32ts, etc., in Wirewatcher, a Wordpress blog (which I can't link to because it's non-authoritative):
cz32ts botnet