Forum Moderators: open

Message Too Old, No Replies

Botnet-based scans

         

dstiles

4:33 pm on Aug 14, 2016 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



I have no idea what the purpose of this is but it's been hitting my web sites at least since the start of the month and becoming more persistent during the past few days. The IP is, as one would expect of a botnet-based scan, hit and run. Two hits per IP, then another two hits on a new IP, several of these in a short time, approx 30 secs apart. Sometimes a third hit on an IP. Source, unlike semalt, has no LANGUAGE and comes from most parts of the world, as far as I can tell - several from India and UA today, for example; also AU, BA, and many others but no BR so far.

Keeps hitting the same sites repeatedly - but then, I only have a couple of dozen-ish. All to home page only. HTTPS sites are hit in HTTP mode (same as semalt)

Unlike semalt, which I originally thought it might be, there is no referer with these hits, henc why I have no idea of their purpose. Again unlike semalt, it's firefox not chrome, though still an out-of-date version.

UA: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1

Secondary check is a very general, all-accepting HTTP_ACCESS

keyplyr

9:29 pm on Aug 14, 2016 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



What response is your server returning?

Besides missing header language field which, although rare, does occur sometimes with normal traffic, is there any commonality to block?

dstiles

2:03 am on Aug 19, 2016 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



I return 403.

I mentioned the language because semalt has a signature lang and this has none - just a comparison that helped me decide I was on the wrong track.

The UA is pretty unique and obsolete.

keyplyr

2:34 am on Aug 19, 2016 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



I used to see a lot more botnets than I do now. However, the constant barrage of compromised accounts (servers or ISP) seeking wp-login.php certainly falls under that definition.