top of page
Incident Response
We reviewed Linux access logs through Cockpit, MariaDB logins, WordPress logins and attempts, as well as site traffic to identify our attacker. The only sign we saw of them was their accessing of our website and attempt to exploit it through the use of comments. Their attacks were unsuccessful.
Attempted attacks via WordPress comments
Identification of attacker's IP address via WPHide Login History
WordFence web-application firewall blocked 1590 attacks
bottom of page