Steem Load Balancer Got Malformed JSON payload (scan or attack?)

in #steem3 days ago

The https://steem.justyy.com got a SIGTERM and I checked the logs and see quite a few requests with Malformed JSON payload.

0b84566654f9dd8367b65eb736a05aa.png

I can see:

<?php echo ...
shell_exec

These are attack payloads — but the server is rejecting them:

  • They’re probably from bots or automated vulnerability scanners
  • They're testing if the server blindly executes incoming data (like a poorly secured PHP server might)

Example payloads you saw:

  • ?php echo ... ? → looking for PHP code injection
  • shell_exec("...") → looking for command injection vulnerabilities

Steem to the Moon🚀!

Sort:  

Great post! Featured in the hot section by @punicwax.