Jump to content

Recommended Posts

Posted

php://filter/convert.iconv.UTF8.CSISO2022KR|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.CP866.CSUNICODE|convert.iconv.CSISOLATIN5.ISO_6937-2|convert.iconv.CP950.UTF-16BE|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|c

 

what is this someone trying to login by using this what is this ?

cann somebody explain ?

Posted

They look to be ATTEMPTING brute force logins and switched to trying to look for a PHP exploit.  

Each of these would have failed, but it looks like a malicious actor.  You might want to just block their IP itself in your firewall if you have one or have your host block them.  

Posted (edited)
7 minutes ago, Randy Calvert said:

They look to be ATTEMPTING brute force logins and switched to trying to look for a PHP exploit.  

Each of these would have failed, but it looks like a malicious actor.  You might want to just block their IP itself in your firewall if you have one or have your host block them.  

Hi thanks

 

Edited by xTheBoss
Posted

IPB's systems are already smart enough to reject those kinds of activities.  You don't need to code anything if you're using the suite.  The fact that it was attempted though is still logged even though it's stopped.  

But if that IP itself is doing that sort of activity, why allow them to even try?  Just block the IP itself from even reaching your server.  

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...