Congratulations,
Dumbass

> cat /var/log/your-failures.log_

A very special round of applause for 104.42.42.111 for their valiant — and entirely unsuccessful — attempt to compromise our systems. We truly couldn't have done it without you. Well, actually we could. We did. You failed.

We Might Not Know Where You Live, But...

Did you think you were anonymous? That's adorable. Here's what we know about you:

IP Address 104.42.42.111
Country United States
Region California
City San Jose
ISP / Org Unknown
Timezone Unknown
Coordinates 37.3388, -121.8916

Your Digital Fingerprint

Nice browser you've got there. It'd be a shame if someone… logged it.

Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36

Your Hall of Shame

Every single one of your pathetic attempts, lovingly preserved for posterity. Spoiler alert: they all failed.

Attack Breakdown

8
Server-Side Request Forgery
1
General Fuzzing / Forced Browsing
9
Total Failed Attempts

Detailed Activity Log

# Timestamp Attack Type Method Target URI Detail
1 2026-04-02T15:46:52Z Server-Side Request Forgery GET /celebrate?ip=113.189.30.105 ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
2 2026-04-02T15:46:52Z Server-Side Request Forgery GET /blog/streamlining-incident-response-with-soc ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
3 2026-04-02T15:46:52Z Server-Side Request Forgery GET /2014/02/13/the-target-hack-as-an-apt-style-attack/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
4 2026-04-02T15:46:52Z Server-Side Request Forgery GET /penetration-testing/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
5 2026-04-02T15:46:52Z Server-Side Request Forgery GET /2014/06/16/an-interview-with-johan-hybinette/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
6 2026-04-02T15:46:52Z Server-Side Request Forgery GET / ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
7 2026-04-02T15:46:52Z General Fuzzing / Forced Browsing GET /2014/06/05/quick-and-easy-website-vulnerability-scans-with-owasp-zap/ general_fuzzing [URI][REQUEST_URI] matched /(?:sqlmap|havij|pangolin|acunetix|nessus|nikto|netsparker|burpsuite|owasp[\s-]?zap)/i
8 2026-04-03T18:30:45Z Server-Side Request Forgery GET /blog/pen-test-reports-prioritise-security-investment ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
9 2026-04-03T18:30:45Z Server-Side Request Forgery GET /blog/how-does-physical-penetration-testing-differ-from-digital-testing ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i

In Summary

You came. You saw. You got absolutely owned by a hedgehog.

Every request you made was detected, logged, and laughed at. Our WAF didn't even break a sweat. Maybe next time try something more challenging — like reading a book on operational security.

Pro tip: If you're going to hack a cybersecurity company, maybe don't use the same IP address for every single request. Just a thought.