Word Fence Log Question
-
Just wondering if someone could shed some light on whether this log I am seeing is a legitimate request from wordfence or a hacker trying his luck at the plugin. I want to add the command line to my notification ignore whitelist but need to know if this is a legitimate request from the plugin or not. All three files exist in the wflogs folder. Haven’t been able to determine this using other methods so thought I’d ask here.
Executable:
/usr/bin/php
Command Line (often faked in exploits):
/usr/bin/php /home/mywebsite/public_html/wp-admin/admin-ajax.php
Network connections by the process (if any):
tcp: myipaddress:38949 -> myipaddress:80
Files open by the process (if any):
/dev/urandom
/home/mywebsite/public_html/wp-content/wflogs/ips.php
/home/mywebsite/public_html/wp-content/wflogs/config.php
/home/mywebsite/public_html/wp-content/wflogs/attack-data.php
/tmp/sess_907049acba362e28d691d3f5aab143c5
- The topic ‘Word Fence Log Question’ is closed to new replies.