| ▲ | VladVladikoff 4 hours ago | ||||||||||||||||
This is a fundamental misunderstanding of what those bots are requesting. They aren’t parsing those PHP files, they are using their existence for fingerprinting — they are trying to determine the existence of known vulnerabilities. They probably immediately stop reading after receiving a http response code and discard the remainder of the request packets. | |||||||||||||||||
| ▲ | holysoles an hour ago | parent | next [-] | ||||||||||||||||
You're right, something like fail2ban or crowdsec would probably be more effective here. Crowdsec has made it apparent to me how much vulnerability probing is done, its a bit shocking for a low-traffic host. | |||||||||||||||||
| |||||||||||||||||
| ▲ | mattgreenrocks 2 hours ago | parent | prev [-] | ||||||||||||||||
It would be such a terrible thing if some LLM scrapers were using those responses to learn more about PHP, especially because of that recent paper pointing out it doesn't take that many data points to poison LLMs. | |||||||||||||||||