FWAFA.NET automatically keeps a running tab on how many times a visitor (based on their IP adresss) tries to break in to the site. Since the counter was reset a month or so ago there have been 714 failed attempts at logging into the site as an administrator.
stopping plaquenil cold turkey Here is partial list of the IP addresses who have tried to log in as administrators.
Based on an IP address, you can do a geolocation search on the internet and get a rough idea of where the IP address is based.
For example, one of the IP addresses that recently tried to hack in was 18.104.22.168.
A geolocation search provides the following:
Many of the IP addresses are located outside the USA so I have to assume that the admin login attempt has nothing to do with wanting information about FWAFA.NET. Just hackers doing what hackers love to do. The IP addresses that are based locally can sometimes be pinpointed to within a few blocks of their location.
A few hints for those of you who just won’t give up.
The login user name is NOT “admin” or “ADMIN” or AdMin” or “aDmIn” and the password isn’t “password” or “passWord” or “Pa$$worD”