In my webserver log files I sometimes find such entries:
185.30.14.116 [2024-09-14T07:56:57+02:00] 400 | HOST-HDR "185.30.14.116" | SRV _:80" | URI "/"
So there is a request from 185.30.14.116 that my default server received (nginx). But the Host header is also 185.30.14.116!
I consider this security relevant because the header is obviously crafted.
My questions:
- Is there any chance a regular client user / client software would make such a request? (meaning that it is not security relevant)
- Why would an attacker do this, putting the client's IP into the Host header. What is the purpose of this attack/hack??
(my server has direct internet connectivity, no load balancing or similar in the way)