> cat /var/log/your-failures.log_
A very special round of applause for 104.42.42.111 for their valiant — and entirely unsuccessful — attempt to compromise our systems. We truly couldn't have done it without you. Well, actually we could. We did. You failed.
Did you think you were anonymous? That's adorable. Here's what we know about you:
| IP Address | 104.42.42.111 |
| Country | United States |
| Region | California |
| City | San Jose |
| ISP / Org | Unknown |
| Timezone | Unknown |
| Coordinates | 37.3388, -121.8916 |
Nice browser you've got there. It'd be a shame if someone… logged it.
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Every single one of your pathetic attempts, lovingly preserved for posterity. Spoiler alert: they all failed.
| # | Timestamp | Attack Type | Method | Target URI | Detail |
|---|---|---|---|---|---|
| 1 | 2026-04-02T15:46:52Z | Server-Side Request Forgery | GET | /celebrate?ip=113.189.30.105 |
ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i |
| 2 | 2026-04-02T15:46:52Z | Server-Side Request Forgery | GET | /blog/streamlining-incident-response-with-soc |
ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i |
| 3 | 2026-04-02T15:46:52Z | Server-Side Request Forgery | GET | /2014/02/13/the-target-hack-as-an-apt-style-attack/ |
ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i |
| 4 | 2026-04-02T15:46:52Z | Server-Side Request Forgery | GET | /penetration-testing/ |
ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i |
| 5 | 2026-04-02T15:46:52Z | Server-Side Request Forgery | GET | /2014/06/16/an-interview-with-johan-hybinette/ |
ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i |
| 6 | 2026-04-02T15:46:52Z | Server-Side Request Forgery | GET | / |
ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i |
| 7 | 2026-04-02T15:46:52Z | General Fuzzing / Forced Browsing | GET | /2014/06/05/quick-and-easy-website-vulnerability-scans-with-owasp-zap/ |
general_fuzzing [URI][REQUEST_URI] matched /(?:sqlmap|havij|pangolin|acunetix|nessus|nikto|netsparker|burpsuite|owasp[\s-]?zap)/i |
| 8 | 2026-04-03T18:30:45Z | Server-Side Request Forgery | GET | /blog/pen-test-reports-prioritise-security-investment |
ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i |
| 9 | 2026-04-03T18:30:45Z | Server-Side Request Forgery | GET | /blog/how-does-physical-penetration-testing-differ-from-digital-testing |
ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i |
You came. You saw. You got absolutely owned by a hedgehog.
Every request you made was detected, logged, and laughed at. Our WAF didn't even break a sweat. Maybe next time try something more challenging — like reading a book on operational security.
Pro tip: If you're going to hack a cybersecurity company, maybe don't use the same IP address for every single request. Just a thought.