I am not an information security professional as such. I am a self-taught web developer so I hope this question is not too basic.
I have set up a web store via WordPress using WooCommerce and because of this, I have also set up some security (iThemes Security) to monitor login attempts etc. iThemes Security has highlighted a few attempts over the last 2 months which have been thwarted due to either strong passwords or the fact that "admin" is banned as a username.
Running whois searches on the RIPE whois database, the IP addresses of the "attackers" came up with FOP Tokarchuk Oleksandr Stepanovich in Ukraine (abuse@fregat.net) and World Hosting Farm LTD in Ireland (abuse@worldhostingfarm.com).
FOP Tokarchuk Oleksandr Stepanovich in Ukraine
There were 11 brute-force attempts 2 months ago (invalid logins) and 3 brute force attempts today trying to use "admin" as username
World Hosting Farm LTD in Ireland
There were 6 brute-force attempts 3 weeks ago.
The store is not live yet as the stock database is being built at the moment so no information on customers would have been in jeopardy. Each attempt has resulted in 2 hour lockouts for the relevant IP addresses, and emails were sent to me from the website telling me that they were locked out. I have then converted their lockouts to full bans so theoretically no more attempts can be made through those IP addresses. Hopefully I am right on this.
What I am wondering is whether I should contact the relevant responsible organisations via the abuse@ email addresses?
If so, should I send a full copy of the logs relevant to the attempts or snippets of the logs relevant to the IP address and the times of the attempts?