how can I block the attack like this?

fhal meteor8488 at
Wed Sep 5 00:48:43 UTC 2012

Thanks .
But it seems WAF can only support nginx which version is lower than 1.2.0.

At 2012-09-04 22:14:57,"magic.drums at" <magic.drums at> wrote:

what I see is that you want to block XSS attacks and code injection, that is why I recommend a WAF


On Tue, Sep 4, 2012 at 10:49 AM, Jaap van Arragon <j.vanarragon at> wrote:


If the user is coming from the same ip address you can block it in your iptables or firewall.


On 9/4/12 3:45 PM, "magic.drums at" <magic.drums at> wrote:

WAF( at possible solution?


On Tue, Sep 4, 2012 at 10:42 AM, fhal <meteor8488 at> wrote:
 Hi all,

Today my server was attacked. After checked Nginx access log, I found logs like below: - - [04/Sep/2012:20:27:41 +0800] "GET /member.php??username=xxxx&rndnum=-1777927191 HTTP/1.1" 500 186 "-" "-" "-" - - [04/Sep/2012:20:27:41 +0800] "GET /member.php??username=xxxx&rndnum=-1777927191 HTTP/1.1" 500 186 "-" "-" "-" - - [04/Sep/2012:20:27:41 +0800] "GET /member.php??username=xxxx&rndnum=-1777927191 HTTP/1.1" 500 186 "-" "-" "-"

It seems the attacker was using some tool to attack my server. You can see that the user agent / browser version are blank.

Due to I can't block the blank user agent (some web browser is using blank user agent, for example, UC), is there any way can I use to block this kind of attack?


nginx mailing list
nginx at

nginx mailing list
nginx at


Victor Pereira

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <>

More information about the nginx mailing list