Ok, thank you all for your kind responses!
I think I have what I need from the web2py community, and I will resolve 
the issue with the information provided.

If it's possible to change the name of this thread, I do not mind to do so, 
as for what Anthony suggested: 
https://www.lowendtalk.com/discussion/69248/bitninja-abuse-reports

Den fredag 26 februari 2016 kl. 18:05:45 UTC+1 skrev Anthony:
>
> On Friday, February 26, 2016 at 10:57:19 AM UTC-5, Robin Manoli wrote:
>>
>>
>> So, is the above log entry from the *other* server (i.e., not the one 
>>> you control)? I presume the "server.ip" value is the IP address of your 
>>> server, hence the belief that this request is coming from your server, 
>>> correct? If so, how did you get this log entry? Did the owner of the server 
>>> contact you and provide it? Did they request any information from you? Can 
>>> you trust that this is real (as opposed to a social engineering attempt)?
>>>
>>
>> Yes this was the entry from the other server. The report of the entry was 
>> sent to the VPS provider by bitninja.io, and the VPS provider forwarded 
>> it to me asking for a solution. Bitninja didn't ask for anything else than 
>> those logs I posted here, and they said pretty much the same thing about 
>> attempting proxy requests. They seem trustable to me, although I don't see 
>> how these requests from my server keep happening on port 80 on that server 
>> after I blocked it for outgoing traffic.
>>
>
> Note, Bitninja sells server security services (i.e., they have an interest 
> in convincing you that you've got a vulnerability so you will buy their 
> services). A lot of folks seem to think they generate fake reports as a 
> marketing scam -- see:
>
> https://www.lowendtalk.com/discussion/69911/hukot-net-and-bitninja-io
> https://www.lowendtalk.com/discussion/69248/bitninja-abuse-reports
>
> Also, on their home page <https://bitninja.io/>, both the counter and the 
> "live" list of "attacks" are fake -- generated client-side via Javascript 
> (no live updates from the server).
>
> I'm not sure if they sent you more details, but I notice the alleged 
> server log record from them does not include the timestamp, and it does not 
> appear they gave you the host name or IP address of the allegedly attacked 
> server. This means there is no way for you to correlate their alleged 
> records with your own logs (i.e., you cannot match the external host/ip nor 
> the time of the request). They have sent you a very generic and common type 
> of attack, so it may be likely that you would have a matching request in 
> your logs just by chance (and if you don't, all the more reason to doubt 
> them).
>
> If you think they're for real, tell them you at least want to see 
> timestamps -- if you don't see a matching request in your logs around the 
> same time, I would highly doubt their reports are real.
>
> Anthony
>

-- 
Resources:
- http://web2py.com
- http://web2py.com/book (Documentation)
- http://github.com/web2py/web2py (Source code)
- https://code.google.com/p/web2py/issues/list (Report Issues)
--- 
You received this message because you are subscribed to the Google Groups 
"web2py-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to web2py+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to