Hackin9
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 

Over the last few daysseveral of my honeypots have reported the following request from an IP address in Germany."> GET //a2billing/customer/templates/default/header.tpl HTTP/1.0q=0.3Connection: TE, closeHost: --snip--:443User-Agent: libwww-perl/6.15">The URL seems associated with a popular billing system for VOIP.There is nothing particularly special regarding the request.The IP address itself seems to be associated with various malicious activities over the past year or two, so I can only speculate that there is a vulnerability in the billing product and it is being scanned for.

So, if you happen to use this particular product and you therefore may have the particular page, there is a fair chance that you may have a request from this IP address. If you do and you are able to share what other requests are made by this particular IP address subsequent to the above request, then please submit it using the contact form. It will be much appreciated. If you have packets to with the requests even better :-)

Cheers

Mark

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Internet Storm Center Infocon Status