I'm using BB2 ( badbehavior2 ). Today I had the following in the log files:
403 Request contained a malicious JavaScript or SQL injection attack 2007-11-14 18:09:40 72.14.193.1 Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; IEMB3; IEMB3)
The code used:
/node/4124#comment-477
Headers:
GET /node/4124#comment-477 HTTP/1.1 Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */* Accept-Encoding: gzip Accept-Language: en-us Cookie: PHPSESSID=554c98325f86ae95927204be27b834bc; bb2_screener_=1195063773+72.14.193.1+86.106.50.55 Host: www.mysite.com Referer: http://www.mysite.com/node/4124 User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; IEMB3; IEMB3) X-Forwarded-For: 86.106.50.55 X-moz: prefetch
IP Whois = 72.14.193.1 - - [20/May/2007:12:38:06 +0200] "GET /images/cs.gif HTTP/1.1" 200 546 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; Google Wireless Transcoder;)"
IP Whois = 86.106.32.0/19 inetnum: 86.106.32.0 - 86.106.63.255
netname: SC-UPC-ROMANIA-SA
descr: SC UPC Romania SA
descr: str. Herastrau 17
descr: Bucuresti 1
country: ro
admin-c: AH1598-RIPE
tech-c: MA190-RIPE
status: ASSIGNED PA
remarks: Registered trough http://www.jump.ro/ip.html