Forum Moderators: open
2.) When you describe things, it would really help if you include log excerpts because descriptions can be tough to decipher.
119.167.225.1 - - [22/Nov/2011:08:54:46 -0800] "GET /fun/AlonzoMelissa.html HTTP/1.0" 200 998 "http://www.example.com/fun/AlonzoMelissa.html" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; FunWebProducts; .NET CLR 1.1.4322; PeoplePal 6.2)"
94.199.182.46 - - [22/Nov/2011:08:54:54 -0800] "GET /fun/AlonzoMelissa.html HTTP/1.1" 200 1035 "{exactly the same}"
189.16.82.34 - - [22/Nov/2011:08:55:03 -0800] "GET /fun/AlonzoMelissa.html HTTP/1.0" 200 1035 "{ditto}"
79.143.182.253 - - [22/Nov/2011:08:55:14 -0800] "GET /fun/AlonzoMelissa.html HTTP/1.1" 200 1035 "{ditto}"
79.143.182.253 - - [22/Nov/2011:08:55:15 -0800] "GET /fun/AlonzoMelissa.html HTTP/1.1" 200 1035 "{ditto}"
114.215.28.125 - - [22/Nov/2011:08:55:50 -0800] "GET /fun/AlonzoMelissa.html HTTP/1.1" 200 1035 "{ditto}"
50.56.84.106 - - [22/Nov/2011:08:56:01 -0800] "GET /fun/AlonzoMelissa.html HTTP/1.0" 200 794 "{ditto}"
94.199.182.46 - - [22/Nov/2011:08:56:24 -0800] "GET /fun/AlonzoMelissa.html HTTP/1.1" 200 1035 "{ditto}"
3.) FWIW, this self-referrer is fake --
http://www.yourdomainhere.com
-- and thus blockworthy as-is. Is that what you saw?
FunWebProducts is the key here.
It's been a compromised tb for some years.
Why wouldn't you put the kibosh on a proven botnet tell?
I generally don't like rules that force the server to stop and investigate every single page request. And my informational niches are soooo narrow that I really don't want to risk locking out even one human by mistake.