Reconnaissance
Probing
Brute-Force
Compromise
Post-Login Behavior
Reconnaissance
The attacker is mapping the login surface and gathering public metadata.
What you might see- Unusual user-agent strings
- Repeated 404s from the same IP
- Requests to non-existent admin pages
How defenders respond- Enable rate limiting
- Use a WAF to block scanners
- Hide sensitive endpoints behind authentication