QUIC.cloud CCSS returning node_wpapi_failed on every attempt. SiteGround confirmed requests reach the server fine. Wordfence allowlisted. Domain reconnected. REST API responds correctly from browser. LiteSpeed log shows the job posts to eu-service-ctr2.quic.cloud successfully with usage incrementing (quota going up each attempt), but callback always fails. Self-curl also returning 202 on some URLs instead of 200.
Snippets of the logs:
02/27/26 19:45:56.133 [216.128.179.195:12136 1 9K2] ❄️ posting to : https://eu-service-ctr2.quic.cloud/queue 02/27/26 19:45:57.530 [216.128.179.195:12136 1 9K2] ❄️ Service TTL to save: 1761 02/27/26 19:45:57.532 [216.128.179.195:12136 1 9K2] ❄️ ❌ Hit err _code: node_wpapi_failed 02/27/26 19:45:57.532 [216.128.179.195:12136 1 9K2] ❄️ ❌ _err: WordPress gave an unexpected response when notified with QUIC.cloud service results. Check WP API is properly configured. --- array ( '_res' => 'err', '_code' => 'node_wpapi_failed', '_msg' => 'WordPress gave an unexpected response when notified with QUIC.cloud service results. Check WP API is properly configured.', '_ttl' => 1761, ) 02/27/26 19:45:58.649 [216.128.179.195:12136 1 9K2] 🕸️ ❌ Response code is not 200 in self_curl() [code] 202
So quic’s own bot detection has been driving me insane for hours. Phenomenal. Once I added the quic ip list (well 100 of the 154) to my allow list, I don’t have the issue. That is insanely frustrating.
from my test, the response I got when sending request from node , it is blocked by sgcaptcha , which I believe stands for SiteGround anti-bot challenge
I spoke back with Siteground, and they said the following;
I reviewed our logs again and did not find any requests for “wp-json/litespeed/v1/” that were intercepted by our CAPTCHA.
However, I did identify requests for “wp-content/litespeed/js” originating from IP addresses included in your list, which did trigger our CAPTCHA protection.
It’s true, quic just has a ton of IP’s to cover, while SG only allows 5 on a whitelist. Thanks for your help so far, I”ll report back with what SG says.
Although the user agent indicates qcbot/1.0, the IP address 57.129.146.219 also generated requests using a different user agent that is considered suspicious:
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36
Public reports associate this type of activity with irregular or potentially malicious behavior. For reference, you may review the following article, which includes examples of similar user agents:
A similar pattern was observed for the other IP address, which also made requests using the Go-http-client user agent.
As a temporary measure, I have removed the limits on both IP addresses. However, I strongly recommend contacting QUIC.cloud to confirm whether these suspicious user agents are legitimately used by their service.“
Look forward to your reply.
This reply was modified 1 month, 1 week ago by gtaretrofits.
yes, it’s kind of the way how it works , the website may respond differently based on user agent, typically , to differentiate mobile and desktop , so in this case for UCSS/CCSS/VPI , it will send request in few different UA , for example , to fetch/visit your page to generate CCSS or UCSS , or VPI , as desktop , then it will do chrome desktop ua , and/or to fetch your page as mobile device, then it will do chrome mobile ua
and lastly , when it posts result back to your site, it will use qcbot ua
Would you be able to confirm if those specific user agents being used are the legitimate ones being used by your service, just so that I have something firm to report to siteground?
yes , when a page is queued for something , say CCSS , it will queue the page , type , requested UA (whoever triggers this queue with bot-like ua cleansing) , post it to QC node
QC node then will use this user agent to fetch page , get critical css, then use qcbot ua post it back to site.
This reply was modified 1 month, 1 week ago by qtwrk.
This reply was modified 1 month, 1 week ago by qtwrk.