Invision Community 4: SEO, prepare for v5 and dormant account notifications Matt November 11, 2024Nov 11
Posted March 16, 20231 yr php://filter/convert.iconv.UTF8.CSISO2022KR|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.CP866.CSUNICODE|convert.iconv.CSISOLATIN5.ISO_6937-2|convert.iconv.CP950.UTF-16BE|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|c what is this someone trying to login by using this what is this ? cann somebody explain ?
March 16, 20231 yr They look to be ATTEMPTING brute force logins and switched to trying to look for a PHP exploit. Each of these would have failed, but it looks like a malicious actor. You might want to just block their IP itself in your firewall if you have one or have your host block them.
March 16, 20231 yr Author 7 minutes ago, Randy Calvert said: They look to be ATTEMPTING brute force logins and switched to trying to look for a PHP exploit. Each of these would have failed, but it looks like a malicious actor. You might want to just block their IP itself in your firewall if you have one or have your host block them. Hi thanks Edited March 16, 20231 yr by xTheBoss
March 16, 20231 yr IPB's systems are already smart enough to reject those kinds of activities. You don't need to code anything if you're using the suite. The fact that it was attempted though is still logged even though it's stopped. But if that IP itself is doing that sort of activity, why allow them to even try? Just block the IP itself from even reaching your server.
March 16, 20231 yr You should probably ask whoever writes that software, that is not an Invision Community table structure.
March 16, 20231 yr Author Im using it trough IPB i srsly don't want to risk to lose IPB forum ... and being hacked