Could you give us more info? What useragent get? Can you give a screenshot?
You should click the BROWSER link and copy/paste the useragent string.
Plugin Contributor
helened
(@helened)
Hi NewsArena,
I see the problem. page_id=175
is being misunderstood by Wassup as an attempt to access a user account with id=175
. I’ll do a fix right away.
Plugin Contributor
helened
(@helened)
NewsArena,
The fix won’t be ready for at least a day.
You can stop this from happening right now by doing this:
Navigate to Wassup >> Options >> [General_Setup] tab
and under Statistics recording, UNCHECK Enable spam and malware detection on records
and save settings.
Helene.
Unfortunately this bug persist in the new version.
http://imgur.com/a/PWKZZ
It’s not only on sites without permalinks.
-
This reply was modified 6 years, 5 months ago by
NewsArena.
Plugin Contributor
helened
(@helened)
Sorry. We must have missed something in our tests.
I looked at your screenshot and it seems that either the “/wp-admin/admin-ajax.php” request or the “bing” referrer data may be triggering the hack attempt label in that example.
Can you tell me if “/wp-admin/admin-ajax.php” requests are consistently in the details from each “hack attempt” record?
Thanks.
Can you tell me if “/wp-admin/admin-ajax.php” requests are consistently in the details from each “hack attempt” record?
No, it’s not only “/wp-admin/admin-ajax.php” requests.
I am attaching new screenshot:
http://imgur.com/a/ytvoX
And another one. Keywords are always (not provided)
http://imgur.com/a/tRqSn