16.29 Million Access Logs Analyzed: What We Learned About Global WordPress Attacks

16.29 Million Access Logs Analyzed: What We Learned About Global WordPress Attacks

November 29, 2025

 

Over the past 11 days, our global threat detection infrastructure has been running hot—processing 16.29 million access logs (traffic coming in to websites)  across three continental regions. The data tells an interesting story about where attackers are focusing their efforts, where it’s coming from and some of it runs counter to conventional wisdom.

 

The Numbers

Region Logs Processed Current Rate Peak Rate Trend
APAC 1,250,000 73.3% 85.7% ↓ Improving
US 12,800,000 57.0% 57.1% → Stable
EU 2,241,000 37.3% 52.3% ↓ Strong improvement

 

The headline: Asia-Pacific faces the highest threat concentration at 73%—nearly three out of four log entries are suspicious. But here’s the good news: that’s down from a peak of 85.7% just ten days ago.

 
 

APAC: The Hot Zone (But Cooling Down)

 

When we first spun up our new APAC monitoring on November 20th, the numbers were alarming. Over 85% of incoming traffic was flagged as suspicious. That’s not a typo—attackers were specifically hammering APAC-hosted infrastructure.

 

Ten days later, we’re at 73%. Still high, but a 12-point improvement is meaningful. The pattern suggests either successful mitigation efforts across the region, or attackers rotating to other targets, or our reporting abusive IP addresses is making progress. During this time, we reported 1,250,257 unique IP addresses to various providers. We don’t know what the reason is, but APAC remains the region requiring the most vigilance.

 
 

US: The Volume Leader

 

The US cluster has processed the lion’s share of our traffic—12.8 million logs, roughly 78% of total volume. The suspicious rate? A rock-solid 57.0%.

 

What’s remarkable is the stability. Over two days of intense monitoring, the rate barely budged from 57.0-57.1%. This tells us the attack infrastructure targeting US sites is mature and automated. For defenders, this predictability is actually useful—stable patterns mean reliable detection.

 
 

EU: The Success Story

 

Europe shows what good security practices look like at scale. Starting at 52.3% suspicious on November 18th, the EU feed has dropped to 37.3%—a 15-point improvement and the best trajectory of any region.

 

At 37%, EU sites are seeing roughly half the malicious traffic intensity of APAC. This may reflect stronger baseline security practices, GDPR-driven investments, or simply different attacker economics. Whatever the cause, it’s working.

 
 

What This Means For You

 

If you’re hosting in APAC: The 73% rate means attackers are specifically targeting your region. File integrity monitoring and real-time scanning aren’t optional—they’re essential. The improving trend is encouraging, but don’t let up.

 

If you’re hosting in the US: You’re seeing the highest volume but moderate intensity. The predictable patterns make defense more straightforward. Focus on automation—at 12.8M site log entries and counting, you need scalable solutions.

 

If you’re hosting in the EU: Your region shows what’s possible. The 37% rate and strong improvement trend suggest effective baseline controls. Focus on detecting novel attacks in the 63% of “clean” traffic.

 
 

Methodology

 

This analysis comes from our global cluster infrastructure running log consumers in each region. Logs stream in from monitored WordPress installations and hit our multi-layer detection pipeline: regex patterns, YARA rules, and AI-assisted classification.

 

“Suspicious” means the traffic triggered at least one detection signature. After manual review, confirmed malicious traffic rates typically only have about a 1% false positive rates for specific rule sets. When we detect malicious traffic, we record the source IP address. After we confirm the traffic as definitely malcious, it gets reported to the source (VPS/bare metal providers). They contact their customer to alert them that their server is attacking other sites. This vigilance is part of our daily process. It removes digital assets from the inventory of hackers.

An interesting note. One of our false positives was identifying traffic from MalCare servers as malicious. We corrected that quickly after they notified us. Sorry guys!


We Watch Your Website has been providing WordPress security monitoring and malware removal since 2007. We currently watch over 20 million sites globally.
 
Want to see what’s hitting your servers? [Get started with free monitoring →]