Slash Boxes
NOTE: use Perl; is on undef hiatus. You can read content, but you can't post it. More info will be forthcoming forthcomingly.

All the Perl that's Practical to Extract and Report

use Perl Log In

Log In

[ Create a new account ]

Beatnik (493)

  (email not shown publicly)

A 29 year old belgian who likes Mountain Dew, Girl Scout Cookies, Tim Hortons French Vanilla Flavoured Cappucinno, Belgian beer, Belgian chocolate, Belgian women, Magners Cider, chocolate chipped cookies and Perl. Likes snowboarding, snorkling, sailing and silence. Bach can really cheer him up! He still misses his dog.

Project Daddy of Spine [], a mod_perl based CMS.

In his superhero time (8.30 AM to 5.30 PM), he works on world peace.

Journal of Beatnik (493)

Sunday January 29, 2006
06:26 PM

Log analysis

[ #28512 ]
A quick count on my apache error logs tell me that over the past 4 months, about 1000 attempts have been made to exploit a (missing) XMLRPC PHP script on my webserver. About 400 attempts have been made for a (missing) awstats script. My server only serves personal pages.. OUCH!?!

Maybe I should create some stub pages that state "Nothing to see here! The feds have been warned!" ?
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
More | Login | Reply
Loading... please wait.
  • My access logs are cluttered with this crud too. You could always use a tool like Fail2Ban [] to add them to your firewall ban list.

    -- "It's not magic, it's work..."