Saw this yesterday and discovered I hadn't deliberately trapped it, though Windows trapped the proxy part on its own.
X_Forwaded_For:
148.33.76.24[CHR(0)]shodanscanprint(chr(49).chr(55).chr(73).chr(53).chr(51).chr(48).chr(86).chr(65).chr(117).chr(52));, 10.3.124.25
This is illegal syntax (should be only IPs, commas and spaces). Caught by Windows 12 server (returned 400 code) but not by some earlier Windows. No idea about Apache/linux.
User-Agent:
Mozilla/5.0 (X11; U; Linux i686 (x86_64); en-US; rv:1.8.1.6) Gecko/20070817 IceWeasel/2.0.0.6-g3shodanscanprint(chr(49).chr(55).chr(73).chr(53).chr(51).chr(48).chr(86).chr(65).chr(117).chr(52));
Referer:
[
google.com...]
The chr values as shown are: 1.7.I.5.3.0.V.A.u.4
No idea what they would do but no doubt some kind of exploit. :(
Source was a single IP in Russian hosting: 178.210.64.0 - 178.210.95.255