diff --git a/content/posts/2019-05.md b/content/posts/2019-05.md index 4771ff017..fd001e1e4 100644 --- a/content/posts/2019-05.md +++ b/content/posts/2019-05.md @@ -317,7 +317,7 @@ UPDATE metadatavalue SET text_lang='es_ES' WHERE resource_type_id=2 AND metadata - I found a [blog post from 2018 detailing an attack from a DDoS service](https://www.qurium.org/alerts/azerbaijan/azerbaijan-and-the-region40-ddos-service/) that matches our pattern exactly - They specifically mention: -
The attack that targeted the “Search” functionality of the website, aimed to bypass our mitigation by performing slow but simultaneous searches from 5500 IP addresses.
+
The attack that targeted the "Search" functionality of the website, aimed to bypass our mitigation by performing slow but simultaneous searches from 5500 IP addresses.
- So this was definitely an attack of some sort... only God knows why - I noticed a few new bots that don't use the word "bot" in their user agent and therefore don't match Tomcat's Crawler Session Manager Valve: