• Resolved Sumukha

    (@sumukha)


    Hello,
    seems some culprit brought down our server with these requests (copied from raw access)
    91.200.12.53 – – [08/Apr/2016:01:15:40 -0400] “POST /inc.php?n318a65 HTTP/1.1” 301 260 “https://(ourdomain.com)//” “Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 10.0; Win64; x64)”
    91.200.12.53 – – [08/Apr/2016:01:15:40 -0400] “POST /xml.php?n3729f7 HTTP/1.1” 301 260 “https://(ourdomain.com)//” “Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 10.0; Win64; x64)”
    etc
    I am wondering how to block such an attack immediately (about 200 requests were made before the server shut down).
    Here are my settings:
    http://screencast.com/t/XhrCDgf6

    Thanks!

    https://wordpress.org/plugins/wordfence/

Viewing 11 replies - 1 through 11 (of 11 total)
  • wfasa

    (@wfasa)

    Hello Sumukha,
    I am assuming there is no inc.php and no xml.php on your server and I am a wondering why they look like redirects. Do you know why there is a 301 (redirect) response code on those URLs? If you are not sure, you should check to make sure those files don’t exist.

    When you know some URLs that should not be accessed by anyone you can go to Options/Other Options in Wordfence menu and add these URLs to the setting “Immediately block IP’s that access these URLs:”. An example of what you could put in there for your case

    /inc.php, /xml.php

    This will cause anyone who tries to access those to be blocked immediately. This can be very efficient to stop people who are trying to find entry points for exploits. Just make sure you don’t put any legit URLs in here.

    Thread Starter Sumukha

    (@sumukha)

    Hi Wfasa,

    thanks for your comment and advice.
    There are no files like this on the server.
    I will block these culprits the way you described.

    Thanks again!

    Thread Starter Sumukha

    (@sumukha)

    Very much apprechiate your help and the quality of this plugin.
    Just upgraded to premium.

    wfasa

    (@wfasa)

    Glad I was able to help Sumukha. I’m setting this topic to resolved now. You are welcome to make a new thread in the forum if you have more questions.

    mountainguy2

    (@mountainguy2)

    Hey Sumukaha, can you tell the rest of us how those requests brought down your server? Did the server just crash because of too much traffic, or did you get an actual intrusion and subsequent hack? Thanks, MTN

    Thread Starter Sumukha

    (@sumukha)

    Hello,
    scanning did not reveal anything about modified or new files.
    The amount of requests (about 10 per sec) put a very heavy load on the whole server which responded with a 500 error.
    I still don’t understand what the 301’s are doing in the log. Seems that those requests are being redirected to the homepage.
    I also wonder if this is a typical response that the whole VPS server – all the other sites on it included – goes 500.
    Hosting with A2.

    Thx

    wfasa

    (@wfasa)

    Yes Sumukha, regarding the 301s it would seem that 404s are redirected to your frontpage instead of returning a 404. It is a bit odd but you could try putting that URL in to your browser while keeping a browser console open and see what response the browser receives.

    Thread Starter Sumukha

    (@sumukha)

    Found the reason: When we switched to https, one of our guys actually made an entry in the .htaccess file to redirect all port 80 requests to https…
    No wonder the 404 protection did not kick in!

    mountainguy2

    (@mountainguy2)

    Thanks. Information is power.

    Thread Starter Sumukha

    (@sumukha)

    Still want to thank the Wordfence team for their awesome work.
    You are the best!

    wfasa

    (@wfasa)

    Thanks for reporting back Sumukha!

Viewing 11 replies - 1 through 11 (of 11 total)
  • The topic ‘How to block attacks like these?’ is closed to new replies.