I am realy wonder why in .htaccess
has those code bellow, can tell me what is this code?
<Files 403.shtml>
order allow, deny
allow from all
</Files>
deny from 212.92.53.18
UPDATE: This answer was based on speculation using the facts provided when it was originally posted. The overall consensus seems to be this modification of the .htaccess
file is most likely the result of using server management software such as cPanel so it’s not — on its own — an indication of malware infection.
The contents of that .htaccess
are a bit odd.
<Files 403.shtml>
order allow, deny
allow from all
</Files>
deny from 212.92.53.18
The <Files 403.shtml>
part refers to the 403.shtml
file and it seems to be allowing a custom 403: Forbidden
response (assumption based on file naming) .shtml
file to be sent. The order allow, deny
and related allow from all
explain it to me. It seems like the site is blocking all traffic in some way but wants that 403.shtml
to come through?
But the deny from 212.92.53.18
is quite specific & odd as a result. That is basically blocking any/all access from 212.92.53.18
.
Now typing that out it seems like the .htaccess
is set to explicitly deny access from address 212.92.53.18
which would send a 403
response code, and the <Files 403.shtml>
allows the actual 403: Forbidden
htaccess page to be sent?
But still, it seems odd for a directive to block traffic from one single IP address would be in an .htaccess
file like that.
EDIT: Did a Google search for <Files 403.shtml>
—because if you know Apache configs, that is a highly odd directive—and it seems like this might be part of some malware? Look at this page as well as this page and this other page.
Seems like this is part of a definite XSS backdoor? Perhaps the .htaccess
is in a malware directory, and the deny from 212.92.53.18
is denying the infected server from accessing itself?
ANOTHER EDIT: Okay, putting on my thinking cap — as well as personal experience with web malware — and looking at the specificity of the deny from 212.92.53.18
I think I know what the deal is. This is part of a malware infection. But I bet that 212.92.53.18
is a node on a bonnet because you can curl -I
it & visit it in a browser & it seems to be an active server. Most client IP addresses just won’t do that; who has a web server exposed on a basic ISP connection, right? Unless the machine is infected. So the 403.shtml
is not actually a real 403: Forbidden
page but actually part of the malware. Meaning, a connection being made FROM 212.92.53.18
would trigger 403.shtml
—which is a server side include HTML file—that could be used for unauthorized access. I mean, when has anyone in 2014 last seen active .shtml
files on legit servers, right? It’s all PHP, Python, Java or Ruby nowadays.