I've been reviewing my log files and the tables for Login Security Solution plugin to keep tabs on the brute force uname/pwd botnet attack going on right now. I saw my error_log file had grown quite a bit since Friday last and opened it up to see what was going on. I'm seeing entries like this:
[Sun Apr 14 04:06:42 2013] [error] [client 192.168.254.1] WordPress database error Incorrect key file for table './programs/wp_10_options.MYI'; try to repair it for query INSERT INTOwp_10_options
) VALUES ('_transient_doing_cron', '1365926802.9474289417266845703125', 'yes') ON DUPLICATE KEY UPDATEoption_name
) made by require('wp-blog-header.php'), require_once('wp-load.php'), require_once('wp-config.php'), require_once('wp-settings.php'), do_action('init'), call_user_func_array, wp_cron, spawn_cron, set_transient, add_option
I've optimized and repaired the tables on this site. What caught my eye is the IP addresses are from all around the world and not from within our network so I assume these errors are generated by people outside our network. Which makes me wonder if these are the result of an injection attack. Has anyone seen this before?