Apparent attacks and why WordFence is mentioned in the logs
-
For background, we’ve had WF installed since late last year, have had it configured fully as the firewall since almost the beginning, and as of a week ago have been on 7.1.4.
As of yesterday, we noticed 2-3 minute-long outages (once every hour or two, roughly) that through CPanel we found to coincide with spikes in memory and CPU use.
Examining the raw logs in CPanel during these times, we found various IPs (it always changes after each burst) accessing single random pages on our site. The IPs are in our region, so I suspect use of a proxy, but the mention of WordFence in all of them is what brought me here. So, for example there will be several hundred lines like this within a couple minutes:
70.51.79.58 - - [09/May/2018:22:46:11 -0400] "GET /?wordfence_lh=1&hid=E90134FDB662F6FEC88602AD14EFFA46&r=0.9015211105998135 HTTP/1.1" 503 1159 "https://oursite.com/mission-vision-values/our-team/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36"
Why is WF making an appearance in the URL when being attacked but not normally? Normal access looks like this:
71.8.133.12 - - [10/May/2018:03:05:02 -0400] "GET /waste-reduction/reduce-waste-resources/ HTTP/1.1" 200 22042 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.189 Safari/537.36 Vivaldi/1.95.1077.55"
Understanding this may be helpful in understanding what the attacker is trying to accomplish. It would be nice if WF actually blocked the attacks, but that may be asking too much.
- The topic ‘Apparent attacks and why WordFence is mentioned in the logs’ is closed to new replies.