Also, I would like to know which policy trigger below email?
SERVER_NAME: example.com
USER IP: 162.158.227.140
SCRIPT_FILENAME: /var/www/example.com/htdocs/wp-comments-post.php
REQUEST_URI: /wp-comments-post.php?5871a93580b276e65a83bd4ae97ad586
Do you feel it can get blocked if multiple requests comes over it?
I am asking because I don’t wish to block the above sample condition.
Thanks
Thanks for reporting the issue. I cannot reproduce yet, but I’ll try with the plugins mentioned in your screenshot. There must be a bug somewhere.
The email was send by File Guard (Monitoring > File Guard). It didn’t block the request, it just warned you that someone accessed the script that was modified recently.
Thanks for the response.
Actually, ‘wp-comments-post.php’ file was not modified by me just its path had Query Parameter.
It must have been modified (content) or changed (permissions, ownership, timestamp) to trigger the alert.
If you have a shell access, use the stat command to view all info about this file:
$ stat /var/www/example.com/htdocs/wp-comments-post.php