I was logged into my Cloudflare account today attempting to setup Tunnels when I noticed various security events related to my domain. Upon further inspection I realized that they all originated from a Microsoft Owned IP address (I’m assuming somebody running a Azure VM instance).

Looking into the actual request headers I can see that whatever bot was running was looking for common PHP exploits or unsecured endpoints.

I usually ignore such instances as I have proper firewall rules both on the Cloudflare side as well as my local network side so I’m doubting there’s actually any threat to my network. However, I decided today to email the abuse contact provided from the WHOIS details. Was wondering if anybody else had experience with writing these? Is it even worth writing them or do they just end up being a waste of time?

Edit: Thanks everybody for the responses! Seems that it’s up in the air if I’ll ever get a response back. Maybe that’s okay - Looks like the general consensus is that these usually do end up getting taken seriously (at least by some providers). I guess I’ll keep composing away even if it’s just an exercise in good internet stewardship :)

  • Rashnet@kbin.social
    link
    fedilink
    arrow-up
    15
    ·
    1 year ago

    About 20 years ago I was running a phpnuke site on my home server and had someone doing the same thing as you describe. Hundreds of attempts over and over all night long. I went through the logs and saw it was someone on intelsat (I think, it’s been a long time) internet from Africa. I called intelsat or whoever the company was and talked to their system admin that was on call. Within 20 mins of getting off the phone the attack stopped and never happened again. They guy I talked to was really nice and seemed like he was happy to be able to help me.

    • philpo@feddit.de
      link
      fedilink
      arrow-up
      4
      ·
      1 year ago

      Why the f*** is someone using Intelsat for that. That must be so fucking expensive (for the victim of the bot) and slow for the hacker.

      • Rashnet@kbin.social
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        1 year ago

        I wondered the same thing at the time it had to have been ungodly expensive unless it was a stolen device. I can’t remember for sure if it was intelsat or one of the other companies that was around at the time but it was a sat connection. I was also running that webserver on a really bad dsl line. I lived right next door to the phone company CO but was at the end of the line. I had to go with an independent isp because the phone company said it was too far and wouldn’t work. It did work but was super unreliable.

        • philpo@feddit.de
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          Very likely a stolen device. Or a mining camp with shared access.

          I can feel the heart attack they had when opening their phone bill next month…

          Holy shit!

    • dan@upvote.au
      link
      fedilink
      arrow-up
      2
      ·
      1 year ago

      a phpnuke site

      Wow, that’s a name I haven’t heard in a loooong time. I remember running PHP-Nuke sites on PHP 4.