and all of of the IPs on above Google Docs spreadsheet were running same script as these persons recently reported. persons are literally sitting and guessing passwords for usernames obtained via post or some other script. example (consistently via a hosted cloud site, especially Amazon and DigitalOcean):
164 159.65.104.178 1 Apr 16, 2019 “log => [site-username-redacted]
pwd => 1234567
wp-submit => Log In
redirect_to => https://[domain].com/wp-admin/
testcookie => 1
—————————”
we’ve set up username for blog posts (author), but no admin privs, set original admin name to have no role and created an admin account separately, and that admin can only login w/ fingerprint. so anyone logging auto-triggers a login attempt, which was happening with IP Blacklist (where above is from, but plugin is no longer being updated as of 2-years ago)
but I like what I see w/ Defender. Defender is gathering way more details than IP Blacklist and its kicking a** automatically. but the admin locked out needs to be fixed via a validation page w/ registered notification email address, kind of like 2-factor, but exclusively to allow admins inadvertently locked out.
part of a coordinated cyber attack ring (below), and yes, that is Amazon and DigitalOcean. DigitalOcean, which has fake contact information, never responds to problem. after blocking entire range, persons simply use another IP from a non-blocked range. and Amazon’s response is horrific, even w/ server log files: we have no way of knowing who did this on our network. yup, that’s BILLIONAIRE Amazon’s cyber security: shruggin’, we-don’t-know, oh well. ??
and even scarier: Norton/Symantec has partnered with DigitalOcean ??for its new VPN service, while there were so many other credible services out there to use.
159.65.104.178 – – [16/Apr/2019:00:12:31 -0400] “GET /wp-login.php HTTP/1.1” 200 5718 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
159.65.104.178 – – [16/Apr/2019:00:12:32 -0400] “POST /wp-login.php HTTP/1.1” 200 6599 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
159.65.104.178 – – [16/Apr/2019:00:12:34 -0400] “GET /wp-login.php HTTP/1.1” 404 369 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
159.65.104.178 – – [16/Apr/2019:00:12:36 -0400] “POST /wp-login.php HTTP/1.1” 404 369 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
159.65.104.178 – – [16/Apr/2019:00:12:42 -0400] “POST /xmlrpc.php HTTP/1.1” 403 489 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
206.189.237.175 – – [13/Apr/2019:17:02:32 -0400] “GET /wordpress/wp-login.php HTTP/1.1” 404 30105 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
206.189.237.175 – – [15/Apr/2019:21:24:40 -0400] “GET /wp-login.php HTTP/1.1” 200 5717 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
206.189.237.175 – – [15/Apr/2019:21:24:42 -0400] “POST /wp-login.php HTTP/1.1” 200 6600 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
206.189.237.175 – – [15/Apr/2019:21:24:45 -0400] “GET /wp-login.php HTTP/1.1” 404 370 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
206.189.237.175 – – [15/Apr/2019:21:24:46 -0400] “POST /wp-login.php HTTP/1.1” 404 370 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
206.189.237.175 – – [15/Apr/2019:21:24:47 -0400] “POST /xmlrpc.php HTTP/1.1” 403 490 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
ec2-3-16-108-24.us-east-2.compute.amazonaws.com – – [14/Apr/2019:06:51:40 -0400] “GET /wp2/wp-login.php HTTP/1.1” 404 30105 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
ec2-3-16-108-24.us-east-2.compute.amazonaws.com – – [15/Apr/2019:19:15:33 -0400] “GET /wp-login.php HTTP/1.1” 200 5717 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
ec2-3-16-108-24.us-east-2.compute.amazonaws.com – – [15/Apr/2019:19:15:34 -0400] “POST /wp-login.php HTTP/1.1” 200 6600 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
ec2-3-16-108-24.us-east-2.compute.amazonaws.com – – [15/Apr/2019:19:15:36 -0400] “GET /wp-login.php HTTP/1.1” 404 366 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
ec2-3-16-108-24.us-east-2.compute.amazonaws.com – – [15/Apr/2019:19:15:37 -0400] “POST /wp-login.php HTTP/1.1” 404 366 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
ec2-3-16-108-24.us-east-2.compute.amazonaws.com – – [15/Apr/2019:19:15:37 -0400] “POST /xmlrpc.php HTTP/1.1” 403 486 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
ec2-3-123-4-218.eu-central-1.compute.amazonaws.com – – [15/Apr/2019:02:27:54 -0400] “GET /wp-login.php HTTP/1.1” 200 5715 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
ec2-3-123-4-218.eu-central-1.compute.amazonaws.com – – [15/Apr/2019:02:27:55 -0400] “POST /wp-login.php HTTP/1.1” 200 6599 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
ec2-3-123-4-218.eu-central-1.compute.amazonaws.com – – [15/Apr/2019:02:27:56 -0400] “GET /wp-login.php HTTP/1.1” 404 366 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
ec2-3-123-4-218.eu-central-1.compute.amazonaws.com – – [15/Apr/2019:02:27:57 -0400] “POST /wp-login.php HTTP/1.1” 404 366 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
ec2-3-123-4-218.eu-central-1.compute.amazonaws.com – – [15/Apr/2019:02:27:58 -0400] “POST /xmlrpc.php HTTP/1.1” 403 486 “-” “Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0”
-
This reply was modified 5 years, 7 months ago by itnc10001.
-
This reply was modified 5 years, 7 months ago by itnc10001. Reason: typos