increased attack rate
-
I regularly get notifications like the one below, but why isn’t WordFence simply blocking the IP address? Why is it instead allowing the continued attack from the same IP’s
The Wordfence Web Application Firewall has blocked 131 attacks over the last 10 minutes. Below is a sample of these recent attacks:April 22, 2021 10:59pm 188.40.240.200 (Germany) Blocked for SQL Injection in query string: cat = -1/**//**/OR/**/2563=CONCAT(CHAR(109)+CHAR(101)+CHAR(104)+CHAR(55),(SELECT/**/(CASE/**/WHEN/**/(8919…
April 22, 2021 10:59pm 188.40.240.200 (Germany) Blocked for SQL Injection in query string: cat = -1/**//**/AND/**/2563=CONCAT(CHAR(74)+CHAR(76)+CHAR(106)+CHAR(52),(SELECT/**/(CASE/**/WHEN/**/(8919=…
April 22, 2021 10:59pm 188.40.240.200 (Germany) Blocked for SQL Injection in query string: cat = -1/**//**/OR/**/7732/**/IN/**/(SELECT/**/(CHAR(86)+CHAR(105)+CHAR(101)+CHAR(114)+(SELECT/**/(CASE/**…
April 22, 2021 10:59pm 188.40.240.200 (Germany) Blocked for SQL Injection in query string: cat = -1/**//**/AND/**/7732/**/IN/**/(SELECT/**/(CHAR(72)+CHAR(51)+CHAR(115)+CHAR(120)+(SELECT/**/(CASE/**…
April 22, 2021 10:59pm 188.40.240.200 (Germany) Blocked for SQL Injection in query string: cat = -1/**//**/UNION/**/ALL/**/SELECT/**/(CHAR(102)+CHAR(120)+CHAR(84)+CHAR(75)+(NULL)+CHAR(99)+CHAR(73)+…
April 22, 2021 10:59pm 188.40.240.200 (Germany) Blocked for SQL Injection in query string: cat = -1/**//**/AND/**/EXP(~(SELECT/**/*/**/FROM/**/(SELECT/**/CONCAT(0x58674c64,(SELECT/**/(ELT(2836=2836…
April 22, 2021 10:59pm 188.40.240.200 (Germany) Blocked for SQL Injection in query string: cat = -1/**//**/OR/**/UPDATEXML(5947,CONCAT(0x4a643166,(SELECT/**/(ELT(2836=2836,1))),0x67614c66),5431)#
April 22, 2021 10:59pm 188.40.240.200 (Germany) Blocked for SQL Injection in query string: cat = -1/**//**/OR/**/(SELECT/**/5808/**/FROM(SELECT/**/COUNT(*),CONCAT(0x4b5a367a,(SELECT/**/(ELT(2836=28…
April 22, 2021 10:59pm 188.40.240.200 (Germany) Blocked for SQL Injection in query string: cat = -1/**//**/OR/**/ROW(2018,1386)>(SELECT/**/COUNT(*),CONCAT(0x4141495a,(SELECT/**/(ELT(2836=2836,1))),…
April 22, 2021 10:59pm 188.40.240.200 (Germany) Blocked for SQL Injection in query string: cat = -1/**//**/AND/**/(SELECT/**/5808/**/FROM(SELECT/**/COUNT(*),CONCAT(0x56566a52,(SELECT/**/(ELT(2836=2…
- The topic ‘increased attack rate’ is closed to new replies.