<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: sashi sharma</title>
    <description>The latest articles on DEV Community by sashi sharma (@sashi_sharma_311f98faf173).</description>
    <link>https://dev.to/sashi_sharma_311f98faf173</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1915907%2F0a816465-1a67-4031-a1c6-c1d2f203727d.png</url>
      <title>DEV Community: sashi sharma</title>
      <link>https://dev.to/sashi_sharma_311f98faf173</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/sashi_sharma_311f98faf173"/>
    <language>en</language>
    <item>
      <title>Thirty minutes after going public, my server logs looked like a crime scene.</title>
      <dc:creator>sashi sharma</dc:creator>
      <pubDate>Thu, 19 Mar 2026 14:46:05 +0000</pubDate>
      <link>https://dev.to/sashi_sharma_311f98faf173/thirty-minutes-after-going-public-my-server-logs-looked-like-a-crime-scene-3e6i</link>
      <guid>https://dev.to/sashi_sharma_311f98faf173/thirty-minutes-after-going-public-my-server-logs-looked-like-a-crime-scene-3e6i</guid>
      <description>&lt;p&gt;Thirty minutes after going public, my server logs looked like a crime scene. I deployed to Railway and panicked. WordPress bots, phishing kit scanners, ID enumeration — and then the real problem hit.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It was DNS all along.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I Thought My Server Was Hacked. It Wasn’t.&lt;br&gt;
I recently deployed my FastAPI backend to &lt;strong&gt;Railway (Paid Tier)&lt;/strong&gt;. The dashboard was &lt;strong&gt;green&lt;/strong&gt;, the deployment was successful, and everything looked perfect. Then I opened the server logs.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1e7e9f8ur5x9zt9koqpp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1e7e9f8ur5x9zt9koqpp.png" alt=" " width="800" height="377"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I saw a flood of requests for paths I never created. There were .php files hitting a Python app and weird strings like sberchat.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Mar 19 2026 17:56:41   GET   /blogs/by/wp-admin/setup-config.php        404   696ms
Mar 19 2026 17:59:52   GET   /blogs/by/wordpress/wp-admin               404   966ms
Mar 19 2026 17:59:52   GET   /store/public/by/wordpress                 404   990ms
Mar 19 2026 17:59:52   GET   /posts/by/wordpress/wp-admin/setup-config  404   1s
What Was Actually Happening?
After the initial panic, I realized these weren't targeted attacks.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;WordPress &amp;amp; PHP Scanners: Bots scan every public IP constantly. Since I’m running FastAPI (Python), my server returned a 404, and the bot moved on. This is pure background noise.&lt;/p&gt;

&lt;p&gt;"Sberchat" TDS Probes: These bots are looking for their own phishing kits that might already be installed on compromised servers.&lt;/p&gt;

&lt;p&gt;Account Enumeration: A crawler was brute-forcing random IDs against my /accounts/public/{id} endpoint. A solid reminder to implement rate limiting using Redis.&lt;/p&gt;

&lt;p&gt;The Plot Twist: The Invisible Problem&lt;br&gt;
While I was investigating these "hackers," I tried to log into my own app using my Mobile Hotspot. That’s when I saw the actual issue in the browser console: ERR_NAME_NOT_RESOLVED.&lt;/p&gt;

&lt;p&gt;DNS: The Hidden Culprit&lt;br&gt;
The Railway dashboard was green. The logs showed the bots were hitting the server fine. But my carrier's DNS had a stale cache entry.&lt;/p&gt;

&lt;p&gt;The Fix:&lt;br&gt;
I switched my active network interface to use Google’s DNS:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;resolvectl dns 2 8.8.8.8 8.8.4.4

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The Real Security Takeaways:&lt;br&gt;
Rate limit any endpoints that accept arbitrary user IDs.&lt;/p&gt;

&lt;p&gt;Return 404s for unknown paths to keep your tech stack's footprint small.&lt;/p&gt;

&lt;p&gt;Don't trust your ISP's DNS. Using 8.8.8.8 or 1.1.1.1 is generally more reliable for developers.&lt;/p&gt;

&lt;p&gt;Originally published on &lt;a href="https://www.causalblogs.com/yeturi-trilochan-sashank/linux-city-stories/thirty-minutes-after-going-public-my-server-logs-looked-like-a-crime-scene" rel="noopener noreferrer"&gt;Causalblogs&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
