Reputation: 324
I've just put two Django apps to production and set DEBUG=False for the first time ever.
I'm now getting emails about errors that have occured - all the errors so far are SuspiciousOperation errors and due to the fact that something/someone is hitting the site using its IP address rather than the URL. I do not have the IP address listed in ALLOWED_HOSTS as I am never expecting someone to visit the site using this.
What is the normal thing to do in this situation? Should I be adding the IP address to the list of ALLOWED_HOSTS and possibly missing an error when something is genuinely suspicious? Or is there a way to filter these out? What is the normal practice here? Its been live for 2 days and I have nearly 20 emails. Should I just live with it?
Some of the requests are from Shodan HQ bots which worries me a little. Below is a list of errors and I put each REMOTE_ADDR into incidents.org to try and find more information which is also listed below. My two servers have very similar IP addresses which probably explains them being hit at the same time.
Date-time Server Path Remote Addr AS Name from incidents.org
24/06/2014 06:30 server1 / 125.96.160.190 FIBRLINK Beijing FibrLINK Networks Co.,Ltd.,CN
24/06/2014 22:05 server1 / 66.240.236.119 CariNet, Inc., US - part of the ShodanHQ bonnet to perform internet wide scans
25/06/2014 01:25 server2 /myadmin/scripts/setup.php 108.175.157.140 SoftLayer Technologies Inc., US
25/06/2014 01:25 server2 /MyAdmin/scripts/setup.php 108.175.157.140 SoftLayer Technologies Inc., US
25/06/2014 01:25 server2 /pma/scripts/setup.php 108.175.157.140 SoftLayer Technologies Inc., US
25/06/2014 01:25 server2 /phpMyAdmin/scripts/setup.php 108.175.157.140 SoftLayer Technologies Inc., US
25/06/2014 01:25 server2 /phpmyadmin/scripts/setup.php 108.175.157.140 SoftLayer Technologies Inc., US
25/06/2014 01:25 server2 /muieblackcat 108.175.157.140 SoftLayer Technologies Inc., US
25/06/2014 03:20 server2 /manager/html 58.215.94.3 CHINANET-BACKBONE No.31,Jin-rong Street, CN
25/06/2014 03:20 server1 /manager/html 58.215.94.3 CHINANET-BACKBONE No.31,Jin-rong Street, CN
25/06/2014 05:59 server2 / 23.99.101.155 Microsoft Corporation, US
25/06/2014 05:59 server1 / 23.99.101.155 Microsoft Corporation, US
25/06/2014 07:40 server2 / 202.53.8.82 Beam Telecom Pvt Ltd, IN
25/06/2014 09:08 server1 / 198.20.69.74 Microsoft Corporation, US
25/06/2014 09:08 server1 / 198.20.69.74 Microsoft Corporation, US
25/06/2014 09:08 server1 / 198.20.69.74 Microsoft Corporation, US
25/06/2014 09:19 server2 / 198.20.69.98 SingleHop, US - scanner for shodan HQ, US
25/06/2014 09:19 server2 /robots.txt 198.20.69.98 SingleHop, US - scanner for shodan HQ, US
25/06/2014 10:43 server2 / 198.133.224.185 University of Wisconsin Madison, US
25/06/2014 10:43 server1 /robots.txt 198.133.224.185 University of Wisconsin Madison, US
Upvotes: 2
Views: 244
Reputation: 34102
First, this is OK. I wouldn't call such emails ‘false positives’—someone is probably actually scanning you for vulnerabilities—but on public Internet such scanning happens all the time, in which case these error reports are just noise.
Noise is an issue, though, since among it you may not notice more legitimate error reports in your inbox.
You can get rid of these emails by
(I manage a couple of production but internal-use-only services, and we're updating our Nginx configs to get rid of these emails.)
Upvotes: 3