Results 1 to 3 of 3

Thread: Error logs

  1. #1
    User tetrijeb's Avatar
    Join Date
    04-19-12.
    Location
    Bosnia&Herzegovina
    Posts
    114

    Default Error logs

    Hi,

    lately I was noticed that some users can't access to the website (blocked by firewall). Therefore I've contacted my provider and I was suggested to check the error logs.

    So, I did, and I found out that there is a lot requests for URL that doesn't exist:

    Code:
    [error] [client 31.223.156.29] File does not exist: /var/www/vhosts/***/httpdocs/styles, referer:
    [error] [client 212.90.148.93] File does not exist: /var/www/vhosts/***/httpdocs/wp-admin
    [error] [client 74.208.152.22] File does not exist: /var/www/vhosts/***/httpdocs/test
    [error] [client 184.168.46.19] File does not exist: /var/www/vhosts/***/httpdocs/wordpress
    [error] [client 91.224.140.78] File does not exist: /var/www/vhosts/***/httpdocs/blog
    [error] [client 85.214.127.182] File does not exist: /var/www/vhosts/***/httpdocs/wp
    [error] [client 50.61.224.115] File does not exist: /var/www/vhosts/***/httpdocs/old
    What could be a issue here? I had never installed Wordpress on my domain. Could this be the sign that someone is trying to find Wordpress installation folders (or any other system folders) intentionally?

  2. #2
    User Andreas's Avatar
    Join Date
    07-11-09.
    Location
    Mönchengladbach
    Posts
    499

    Default

    Yes, it seems so. Strange that every request is from another IP. It has nothing to do with contao. Also check that directory listing on your server is deactivated.
    Web-Development, Freelancer, Burgtech, XHTML, HTML5, CSS, PHP, Javascript, MooTools, MySQL and more
    Amazon wishlist

  3. #3
    User tetrijeb's Avatar
    Join Date
    04-19-12.
    Location
    Bosnia&Herzegovina
    Posts
    114

    Default

    I found this on the Internet:

    There have now been several large scale WordPress wp-login.php brute force attacks, coming from a large amount of compromised IP addresses spread across the world since April 2013.

    A large botnet of around 90,000 compromised servers has been attempting to break into WordPress websites by continually trying to guess the username and password to get into the WordPress admin dashboard.
    http://www.inmotionhosting.com/suppo...e-force-attack

    Article is from 2014, but it seems it's still actual.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •