http://pastebin.com/7W0uDrLa
If you need an extensive list of hacker requests (over 200), I put this log entry on pastebin. As mentioned at the top of the pastebin, the hacker used my IP address directly rather than my doman name. I have a "map" that detects typical hacker activity. Perhaps in my "map" of triggers, I should look for bypassing the domain name, that is requests directly to my IP address. There is nothing particularly evil in using my IP address rather than domain name, but would any real user ever use my IP address? Kind of doubtful. _______________________________________________ nginx mailing list nginx@nginx.org http://mailman.nginx.org/mailman/listinfo/nginx