Hi
I would appreciate any thoughts as regards this matter ...
For some days I have been receiving a series of one-off identical html requests at random times during the day to my Arduino website at http://www.2wg.co.nz
What is identical about these requests is that they feature the same get URL (access/download the file at /public/overview.pdf) and involve no other web page browsing. Some system (or systems) are invoking a single URL multiple times a days.
These html requests contain identical User-Agent, Accept, Accept-Language, Accept-Encoding, Host, Referer and Connection html request fields. When I say identical it is noted that there are sometimes very minor differences in the User-Agent field indicating possibly multiple very similarly configured machines making the html requests.
What is not identical about these html requests is that they seem to be coming from random IP addresses all around the world.
What I am observing seems to be symptomatic of a distributed denial of service attack (but the volumes of the requests are insignificant) and/or IP Address spoofing.
It happens that until this afternoon the /public/overview.pdf file was the largest publically accessible file/document on my website.
Here is an example of one of the html requests as written to my system's logs:
6th Jun 22:35:41 ** HTML REQUEST **
- Browser IP: 183.249.42.227
- Socket #: 1
- Dest Port: 36459
- GET /PUBLIC/OVERVIEW.PDF/ HTTP/1.1
- Host: www.2wg.co.nz
- USER-AGENT: MOZILLA/5.0 (MACINTOSH; INTEL MAC OS X 10.7; RV:34.0) GECKO/20100101 FIREFOX/34.0
- Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/webp, image/jpeg, image/gif, image/x-xbitmap,
- */*;q=0.1
- Accept-Language: en
- Accept-Encoding: gzip, deflate
- Referer: http://www.2wg.co.nz/
- Connection: keep-alive
For yesterday and part of today here is the list of the IP addresses for a series of these (typically) identical html requests. You will see that I have looked up the location of the various IP addresses.
6th Jun 05:28:11 IP: 23.94.63.56 New York , United States , Static
6th Jun 07:01:58 IP: 83.143.242.28 United Kingdom, Static
6th Jun 06:37:56 IP: 198.12.91.229 New York , United States , Static
6th Jun 15:21:51 IP: 31.220.44.161 Bayern , Germany , Static
6th Jun 19:15:00 IP: 80.91.175.86 Kyyiv , Ukraine , Static
6th Jun 22:07:31 IP: 180.180.119.88 Bangkok , Thailand , Static
6th Jun 22:35:41 IP: 183.249.42.227 China , Static
7th Jun 01:25:12 IP: 78.129.131.98 London , United Kingdom, Static
7th Jun 02:17:32 IP: 213.107.68.149 United Kingdom, Dynamic
7th Jun 02:18:42 IP: 213.107.68.149
7th Jun 02:19:45 IP: 213.107.68.149
7th Jun 02:25:16 IP: 172.245.125.161 New York , United States , Dynamic
7th Jun 05:52:47 IP: 45.61.34.145 New Mexico, United States , Static
7th Jun 07:29:02 IP: 104.143.16.53 Colorado , United States , Static
7th Jun 07:30:22 IP: 94.126.144.73 , Portugal , Static
7th Jun 07:31:00 IP: 104.140.83.57 Nevada , United States , Static
My observance of these incoming html requests prompted me to research IP Address spoofing and make some changes to four local application URLs (commands) that are only supposed to work on my local area network. The system now uses continuously random and time restricted command strings that are only published on my system's local web page - hopefully I have covered off external spoofing of my local LAN IP addresses to invoke these critical URL commands.
Anyway, any thoughts as to what is behind this activity, and any precautions that I should consider, would be appreciated.
Cheers
Catweazle NZ