217.88.---.--- returned a few minutes into the other host's work to scan
again. The attempts were typical IIS attacks, but the GETS had specific
characters in their text that probably are a signature of the tool or script
being used.
-- Portscan previously identified live hosts
-- HTTP OPTIONS attempts
-- GET /NULL.ida?AAAA(etc. - buffer overflow attempt)
-- GET /NULL.printer HTTP/1.1 Host: AAAAAAAAAAAA(etc. - BO attempt)
-- GET /NULL.idq?HTTP/1.0 401 UnauthoAAAAAAAAAAAA(etc. - BO attempt)
Buffer Overflow attack aiming at IIS (yes! crap!)...
Apache should be okay.