The amount (~6,500) of 404 hits doesn't tell much without knowing the ratio to all hits. However, if these are from IP addresses from your normal users and the ratio is low, it's not likely an attack.
The MobileSafari/602.1 CFNetwork/808.3 Darwin/16.3.
in the user agent usually refers to a situation where an iPhone user is using the Add to Home Screen option in Share menu. While the normal user-agent from the client starts with Mozilla/5.0 (iPhone; CPU iPhone OS
followed by the actual version information and lots of stuff for purely historical reasons,
the Add to Home Screen sends different user-agent while it tries to retrieve standard Apple Touch Icons and the /favicon.ico
standardized in HTML 4.01 and XHTML 1.0.
GET /apple-touch-icon-120x120-precomposed.png HTTP/1.1
GET /apple-touch-icon-120x120.png HTTP/1.1
GET /apple-touch-icon-precomposed.png HTTP/1.1
GET /apple-touch-icon.png HTTP/1.1
GET /favicon.ico HTTP/1.1
In addition to these standard locations there might be something else defined in
<link rel="apple-touch-icon" href="some.png" />
<link rel="apple-touch-icon-precomposed" href="some.png" />
causing it to be retrieved during the shortcut addition.
CFNetwork is an Apple Framework for MacOS ja iOS. Therefore the same user-agent may have been caused by an iOS App. If your site serves any iOS Apps, check that the App doesn't have any historical code that tries to access /fkzk-start.html
.
This particular /fkzk-start.html
file doesn't seem to be a known sign of a vulnerable CMS or alike. Sometimes that kind of known paths are crawled to identify vulnerable sites before an actual attack.