screen shot 2015 02 17 at 18 26 03

Similar Posts

7 Comments

  1. Well written firewall rules can filter out most of the common tools of the DDOS attacker. There is one called LOIC that turns the users web browser into an attack mechanism, sending a flood of packet requests. It doesn’t do much on its own, but get several computers hitting the same site with it and it can interrupt service.

    Why someone would pick your blog at random to test something like that seems odd.

    I seem to remember back in 2010 that hacker group Anonymous breached WordPress security several times, taking advantage of unpatched vulnerabilities.

    Hopefully the WordPress team took your concerns seriously and looked into the matter. It is very easy to identify attacks like I describe above from the system logs.

    1. I don’t think it was DDos because that would lead to an increase in the number of visitors so this seemed to be just one machine. In itself generating 17000 http requests in 20 minutes would be easy to do so I suspect it was just someone playing around.

Leave a Reply

Your email address will not be published. Required fields are marked *