Posted March 16, 20232 yr php://filter/convert.iconv.UTF8.CSISO2022KR|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.CP866.CSUNICODE|convert.iconv.CSISOLATIN5.ISO_6937-2|convert.iconv.CP950.UTF-16BE|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|c what is this someone trying to login by using this what is this ? cann somebody explain ?
March 16, 20232 yr Community Expert They look to be ATTEMPTING brute force logins and switched to trying to look for a PHP exploit. Each of these would have failed, but it looks like a malicious actor. You might want to just block their IP itself in your firewall if you have one or have your host block them.
March 16, 20232 yr Author 7 minutes ago, Randy Calvert said: They look to be ATTEMPTING brute force logins and switched to trying to look for a PHP exploit. Each of these would have failed, but it looks like a malicious actor. You might want to just block their IP itself in your firewall if you have one or have your host block them. Hi thanks Edited March 16, 20232 yr by xTheBoss
March 16, 20232 yr Community Expert IPB's systems are already smart enough to reject those kinds of activities. You don't need to code anything if you're using the suite. The fact that it was attempted though is still logged even though it's stopped. But if that IP itself is doing that sort of activity, why allow them to even try? Just block the IP itself from even reaching your server.
March 16, 20232 yr Community Expert You should probably ask whoever writes that software, that is not an Invision Community table structure.
March 16, 20232 yr Author Im using it trough IPB i srsly don't want to risk to lose IPB forum ... and being hacked