Wordfence hacked?
-
Hi, I’m not very tech savvy, so at the risk of sounding like an idiot, I noticed a few things in Wordfence options that bugged me.
1. Next to ‘Exclude files from scan that match these wildcard patterns. (One per line)’, there are a few entries already in the box;
wp-content/uploads/2009/09/dosafilling.jpg
wp-content/cache/supercache/www.xxxxxxxxxxx.com/tag/thanksgiving-leftover/index-mobile.html.needs-rebuild
wp-content/cache/wp-cache-3dfdc6f3af4758cacc6dab0e33aabbaa.phpAre these supposed to be there?
2. Next to ‘Whitelisted 404 URLs (one per line)’, there are three in the box –
/favicon.ico
/apple-touch-icon*.png
/*@2x.pngAre these supposed to be there?
Finally, in my live traffic, I’m getting a ton of hits that don’t show up in my stats from some kickass torrents site. It shows up in all hits and crawlers. Here’s one example in which I blocked the IP.
United States Newton, United States arrived from https://kat.cr/usearch/robert%20b.%20parker/?field=time_add&sorder=desc and visited https://www.xxxxxxxxxx.com/
11/28/2015 7:58:03 AM (39 minutes ago) IP: 76.1.255.125 [unblock] Hostname: nj-76-1-255-125.dhcp.embarqhsd.net
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/601.2.7 (KHTML, like Gecko) Safari/522.0Another hit me many, many times from kat.me, from a porn download area and illegal movie download area, which I also blocked.
It just didn’t/doesn’t seem legit to me. Am I overreacting? I’ve been attacked several times in the past month, so I’m paranoid, I guess.
- The topic ‘Wordfence hacked?’ is closed to new replies.