Basic Information
I am seeing these when bots attempt to spoof certain header fields with invalid values:
$_SERVER['HTTP_X_FORWARDED_FOR']
$_SERVER['HTTP_CLIENT_IP']
$_SERVER['HTTP_X_REAL_IP']
$_SERVER['HTTP_CF_CONNECTING_IP']
This is caught by our internal type checks. It might be better to cleanse & ignore, once again, so bots don't have a handle to flood our error logs.
If you give a bot the ability to generate errors at will, they will do so, and that will eat up your resources.
I have learned a few lessons testing #9126 that I will log separately. Pretty sure these affect both 2.1 & 3.0.
Steps to reproduce
Expected result
No response
Actual result
No response
Version/Git revision
2.1 & 3.0 Alpha 4
Database Engine
All
Database Version
No response
PHP Version
8.4
Logs
Additional Information
No response