Somebody at 173.44.38.200 was trying at ... / 2014-07-28

2014-07-28 Somebody at 173.44.38.200 was trying at ... 5 years ago
Somebody at 173.44.38.200 was trying at a very high speed to brute-force /wp-login.php for one site on my server. The downside was that there was no /wp-login.php or any part of wordpress to brute-force, but that did not seem to deter the attacker. A temporary firewall rule now rejects all attempts.

Update 2014-07-31: Next load of attempts from 217.66.216.68. And looking back in the logs shows other similar attempts.

Tags: , ,

, reachable as koos+website@idefix.net. PGP encrypted e-mail preferred.

PGP key 5BA9 368B E6F3 34E4 local copy PGP key 5BA9 368B E6F3 34E4 via keyservers pgp key statistics for 0x5BA9368BE6F334E4 Koos van den Hout
RSS
Other webprojects: Camp Wireless, wireless Internet access at campsites, The Virtual Bookcase, book reviews
This page generated in 0.003840 seconds.