Somebody at 173.44.38.200 was trying at ... / 2014-07-28

2014-07-28 Somebody at 173.44.38.200 was trying at ...
Somebody at 173.44.38.200 was trying at a very high speed to brute-force /wp-login.php for one site on my server. The downside was that there was no /wp-login.php or any part of wordpress to brute-force, but that did not seem to deter the attacker. A temporary firewall rule now rejects all attempts.

Update 2014-07-31: Next load of attempts from 217.66.216.68. And looking back in the logs shows other similar attempts.

Tags: , ,

IPv6 check

Running test...
, reachable as koos+website@idefix.net. PGP encrypted e-mail preferred. PGP key 5BA9 368B E6F3 34E4 local copy PGP key 5BA9 368B E6F3 34E4 via keyservers

RSS
Meningen zijn die van mezelf, wat ik schrijf is beschermd door auteursrecht. Sommige publicaties bevatten een expliciete vermelding dat ze ongevraagd gedeeld mogen worden.
My opinions are my own, what I write is protected by copyrights. Some publications contain an explicit license statement which allows sharing without asking permission.
Other webprojects: Camp Wireless, wireless Internet access at campsites, The Virtual Bookcase, book reviews
This page generated by $Id: newsitem.cgi,v 1.55 2021/11/09 13:09:49 koos Exp $ in 0.005696 seconds.