
Questions: 23,728 //
Answers: 52,300 //
Contributing Members: 17,997
Hi All,
We are noticing that someone is trying to access the api deployed in cloudhub as we can see in the logger with below information
**listener found for request: (GET)/manager/html **listener found for request: (POST)/HNAP1/ **listener found for request: (POST)/CGI/Execute None of us are trying to access the api with above url but seeing these logging in cloudhub log. Can any one suggest on this?
Sep 06, 2018 at 04:56 PM, ullgren answered with:
Probably a worm or trojan scanning for systems that has known vulnerabilities in common web applications and platforms. The /manager/html
is probably a probe to check if you are running a tomcat server with the manager console exposed and unprotected.
This is common and as long as you are not running vulnerable versions of the software in question not much you can do about it.
Centralizing CloudHub Logs into Sumo Logic 1 Answer
functionality "Enhanced Log Management" in cloudhub is not visible 1 Answer
Change loglevel for custom logger in CloudHub application when disabled cloudhub logs 2 Answers
Mule cloud hosted API returns back empty response when response time is more from the layer below. 2 Answers