Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17


Suspicious attemots to log in to website

Posted on 2014-07-17
Medium Priority
Last Modified: 2014-10-12
Hi, I'm running a County government website (using the DNN CMS). (Actually several websites)
The website only allows log in for a few administrators to update their content.

I noticed, starting yesterday, that every hour or so, there is a failed attempt to log in to the site. Each attempt uses a different username and comes from a different IP addess. I've done a "Who Is" on the IP addresses and they seem to come from various locations. One of the locations is:

OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam

And there are others as well.

Any idea how I should deal with this to protect the site?


Question by:tommelkonian
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 58

Expert Comment

ID: 40203573
Make sure everyone is using very strong passwords and no obvious usernames to boot like admin
This happens to many many websites and isn't something you can really stop.
It does help to make sure any login pages are not easily accessible if it is possible like links from the main website.
LVL 53

Accepted Solution

Scott Fell,  EE MVE earned 2000 total points
ID: 40203832
I have had a client's DNN site attacked because because of a bad plug in.  After I tracked it down, it was so blatantly easy to google for this being used on the site, then send something to the url and bam, a pirate skull is now on the home page.  

1) Make sure you have nightly back ups to your db.

2) There are services that will offer continuous back ups and if you tend to update your db a lot, this is a good choice.  

3) Make sure all plug ins are up to date.  

4) Research all plug ins.  When was the last time it was updated?  Google, "my_plug_in_name my site was hacked" or "my_plug_in_name hacked" or something similar.   Some plug ins are written by people that just figured something out on their own, got it to work visually, but didn't really understand the implications of what they are doing.  I do think this area is your weakest link.

5) As Gary pointed out, you would be surprised about people and easy passwords.   The problem is, we don't think like the bad guys, we think like us and there for the password we think would be hard to crack is actually very easy.

6) Don't put your admin area in an "admin" folder.   Just for fun, look at your logs and notice how many hits you have to "wp-admin" even though you don't have that folder.  Put your admin files in a folder that is not a common name.

7) Don't put link to your admin log in anywhere on the public facing site.  This means people will have to know or bookmark your admin area.

8) Make sure DNN is up to date.  I would suggest updating your test site with something new before updating your live site.
LVL 53

Expert Comment

ID: 40205181
RIPE is not the one trying to crack your login.  they are the registry for Europe, africa and the middle-east.  However the standards on servers running through RIPE are very loose and they have open proxies all over the zones they server.  These unsecured servers are used by hackers to mask their actual location.  You may be the target of a single hacker using many different proxies, or a group of hackers working on a co-ordinated attack.  

Your chances of tracking down the hacker are just about nil, and blocking the IPs will be little more than a inconvenience for them.  Your best defense is the information that others have already given you.  The only thing I would add is that you should consider enforcing strong password policies that require user to change passwords every 30 days and require password that are a minimum of 12 characters that include upper and lower case letters; numbers and symbols.

Survive A High-Traffic Event with Percona

Your application or website rely on your database to deliver information about products and services to your customers. You can’t afford to have your database lose performance, lose availability or become unresponsive – even for just a few minutes.


Author Comment

ID: 40205577
Thanks for the info. I'm going to go through and address all these things (Not many plug ins on our site). We do have regular backups of database and code base.  Turns out DNN has a Login IP Filter which can allow or deny logins based on IP address. So I'm going to to attempt to only allow logins from users within our network which should be a good start.

Thanks again


Author Comment

ID: 40209874
Looking into the Login IP Filtering in DNN, for the purpose of restricting Logins to our website only to people on our network. It would work by setting up a rule to only allow logins from a given IP address range. Not sure whether this is going to work for us. Are there ways to accomplish this kind of Login Ip address filtering in IIS 7?



Expert Comment

ID: 40211628
Have you considered adding two-factor authentication (2FA) solution for your website? This would especially add value for administrative access to sensitive sites where admins would be required to present a one-time password (OTP) via soft token, hard token or smart phone.

This single control can help prevent many unauthorized logins to sensitive sites and is a necessity for remote access as well (e.g., telecommuters or folks traveling that need to login remotely to your network).

Although I'm not familiar with your setup, some cloud providers (like Amazon AWS) offer free versions of 2FA (e.g., Google Authenticator) and also you can restrict access to specific ports via firewall rules (e.g., RDP access). This may be more difficult to do for HTTP/HTTPS access if you still require access to other pages for non-admins.

2FA could be considered in addition to recommendations previously provided (e.g., monitoring, restricting access by IP, hiding/removing admin login portal access from public access, etc.).

I found a few articles that may help for restricting access via IIS7:

Hope this helps.

Author Comment

ID: 40220086
Thanks Frank.
Not sure if 2FA is exactly what I need but will look into it. Might work specifically for our admin logins (which are the most sensitive).
I have looked at the IIS7 request filtering (thanks for the links). I still don't see how I can restrict access to just the admin area (or perhaps the login page itself) to all but a specified IP Address range.
I haven't figured out how to achieve this is IIS7, or by using the 'Login IP Filter' provided by DNN (still waiting for replies on DNN's forum about this feature).
It is a public website, so I do need to keep the public pages open to all users. So I can't restrict the entire site. I need to just restrict login page/ admin area.

Thanks again, any other information is welcome.

LVL 33

Expert Comment

by:Big Monty
ID: 40220117
have you considered using url rewrite to do this? it'll allow you to set IP restrictions:

Author Comment

ID: 40220195
Thanks. I still don't see how to restrict only the admin area and login page of the website in URL Rewrite. But I'll check in to it.

LVL 53

Expert Comment

by:Scott Fell, EE MVE
ID: 40221023
You might want to try and use the Active Directory for log ins.

Author Comment

ID: 40227477
Thanks for that suggestion (Active Directory). But it appears that method works for an intranet, would it work for a public (internet) website?

Expert Comment

by:Richard Francis
ID: 40337692
You could potentially also use a .htaccess file to restrict access to the log in folders.

Author Closing Comment

ID: 40375808
Thanks for all the info.

Featured Post

Python: Series & Data Frames With Pandas

Learn the basics of Python’s pandas library of series & data frames and how we can use these tools for data manipulation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
When it comes to security, close monitoring is a must. According to WhiteHat Security annual report, a substantial number of all web applications are vulnerable always. Monitis offers a new product - fully-featured Website security monitoring and pr…
The purpose of this video is to demonstrate how to set up an RSS Feed on a WordPress Website. This will be demonstrated using a Windows 8 PC. Feedburner will be used for this demonstration. Go to your WordPress login page. This will look like the…
The viewer will learn how to create and use a small PHP class to apply a watermark to an image. This video shows the viewer the setup for the PHP watermark as well as important coding language. Continue to Part 2 to learn the core code used in creat…

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question