Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- /*
- THiS iS THE iPs and paths that HACKERz N00Bz TRiED to hack us (expose paths, passwd, error logs etc).
- DO NEVER TRY HACK US AGAiN!
- EVEN YOU DO MORE AND MORE, WE (NOT ONLY WE AS YOUR iP iS LOGGED BY NOW!) WiLL REPORT YOUR iP!
- */
- [Mon May 13 06:09:16 2013] [error] [client 216.245.214.3] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23): /w00tw00t.at.ISC.SANS.Win32:)
- [Mon May 13 11:01:15 2013] [error] [client 146.255.32.95] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23): /w00tw00t.at.ISC.SANS.DFind:)
- [Mon May 13 17:57:28 2013] [error] [client 80.241.209.155] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23): /w00tw00t.at.ISC.SANS.DFind:)
- [Mon May 13 20:32:10 2013] [error] [client 80.241.209.155] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23): /w00tw00t.at.ISC.SANS.DFind:)
- [Mon May 13 21:06:35 2013] [error] [client 80.241.209.155] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23): /w00tw00t.at.ISC.SANS.DFind:)
- [Tue May 14 15:13:37 2013] [error] [client 216.245.214.3] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23): /w00tw00t.at.ISC.SANS.Win32:)
- [Wed May 15 23:32:37 2013] [error] [client 85.17.156.16] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23): /w00tw00t.at.ISC.SANS.DFind:)
- [Thu May 16 01:11:18 2013] [error] [client 216.245.214.3] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23): /w00tw00t.at.ISC.SANS.Win32:)
Add Comment
Please, Sign In to add comment