On May 9, 2017, at 2:27 AM, Brian Kantor
<Brian(a)ucsd.edu> wrote:
(Please trim inclusions from previous messages)
_______________________________________________
Yes, the host 'hamradio.ucsd.edu' where the mailing list is hosted
also archives all messages and makes them available via the web.
It's amusing: despite not being real, from the following Apache
log entries, no-such-file has been a popular target this evening:
gw.ampr.org-ssl 70.39.157.194 - - [08/May/2017:17:56:38 -0700] "GET
/private/no-such-file.txt HTTP/1.1" 401 381
gw.ampr.org-ssl 66.85.73.59 - - [08/May/2017:17:58:59 -0700] "GET
/private/no-such-file.txt HTTP/1.1" 401 381
gw.ampr.org-ssl 220.233.167.221 - - [08/May/2017:17:59:43 -0700] "GET
/private/no-such-file.txt HTTP/1.1" 401 381
gw.ampr.org-ssl 4.79.123.0 - - [08/May/2017:18:09:35 -0700] "GET
/private/no-such-file.txt HTTP/1.1" 401 381
gw.ampr.org-ssl 68.40.58.30 - - [08/May/2017:18:56:26 -0700] "GET
/private/no-such-file.txt HTTP/1.1" 401 381
gw.ampr.org-ssl 4.79.123.0 - - [08/May/2017:21:42:57 -0700] "GET
/private/no-such-file.txt HTTP/1.1" 401 381
gw.ampr.org-ssl 165.225.80.161 - - [08/May/2017:21:48:27 -0700] "GET
/private/no-such-file.txt HTTP/1.1" 401 381
The first one above was logged just 19 seconds after I posted the message
to the list. The others came later; they could be humans. Note that
none of them logged in; they just tried to fetch the file and went
away. Oh, I'm not concerned, I just was a bit surprised. And curious.
- Brian
On Tue, May 09, 2017 at 04:42:26AM +0000, Ruben ON3RVH wrote:
Is the content of the list posted on a website?
Like for archiving purposes?
Otherwise someone might have a mailbox from the list configured with a scraper..
Can you see which is the source IP for the requests? Maybe this can lead you to the
correct person..
73,
Ruben - ON3RVH
_________________________________________
44Net mailing list
44Net(a)hamradio.ucsd.edu
http://hamradio.ucsd.edu/mailman/listinfo/44net