patrickkasie
Verified User
Dear DirectAdmin forums,
I'm receiving the following load messages multiple times per day:
This IP address cannot be blocked though, as we use an API that stopped working for the duration of me blocking this IP address. So I want to know which pages are visited or how the load comes to be in the first place. Grepping both IP addresses did not return anything in any of the logs in the log viewer, but 13.82.63.184 did show up everywhere in /var/log/httpd/domains, so it's a crawler. But we don't want to have any crawler just randomly coming up to our server and be like "Here, this specific API call, let me just do that like 270 times". So we want to know how often that API gets called, where it's being called from (upon which page visit) and what the destination IP address is.
We tested tcpdump using the following command on our cellphones on mobile data, with results that were not helpful in any regard:
tcpdump -i eth0 -n dst host 37.19.221.163
I'm receiving the following load messages multiple times per day:
Code:
This is an automated message notifying you that the 5 minute load average on your system is 62.24.
This has exceeded the 10 threshold.
One Minute - 189.14
Five Minutes - 62.24
Fifteen Minutes - 23.43
top - 09:34:15 up 7 days, 20:13, 0 users, load average: 186.09, 63.71, 24.11
Tasks: 678 total, 69 running, 607 sleeping, 0 stopped, 2 zombie
%Cpu(s): 66.6 us, 32.9 sy, 0.0 ni, 0.0 id, 0.1 wa, 0.0 hi, 0.4 si, 0.0 st
KiB Mem : 8008420 total, 121504 free, 7403880 used, 483036 buff/cache
KiB Swap: 1048572 total, 0 free, 1048572 used. 258500 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
1196 mysql 20 0 2869960 1.1g 984 S 39.4 15.0 1556:29 /usr/sbin/mysqld
11827 user1 20 0 506208 53652 8348 R 20.2 0.7 0:02.37 /usr/sbin/httpd -DFOREGROUND
12817 user2 20 0 354620 26880 3924 R 11.7 0.3 0:00.48 php-fpm: pool user2
12724 user3 20 0 351188 24420 2944 R 10.6 0.3 0:00.39 php-fpm: pool user3
12380 user4 20 0 419444 44068 3656 R 6.4 0.6 0:00.57 /usr/sbin/httpd -DFOREGROUND
12515 user5 20 0 413548 39688 3444 R 6.4 0.5 0:00.63 /usr/sbin/httpd -DFOREGROUND
12121 user5 20 0 412968 39772 3092 R 5.3 0.5 0:00.40 /usr/sbin/httpd -DFOREGROUND
12235 user4 20 0 421356 45984 2992 R 5.3 0.6 0:00.59 /usr/sbin/httpd -DFOREGROUND
12331 user2 20 0 353844 24800 2524 R 5.3 0.3 0:00.83 php-fpm: pool user2
12352 user2 20 0 369088 40048 2680 R 5.3 0.5 0:00.83 php-fpm: pool user2
12492 user6 20 0 345016 17020 2260 D 5.3 0.2 0:00.74 php-fpm: pool user6
12531 user2 20 0 350236 21352 2496 R 5.3 0.3 0:00.77 php-fpm: pool user2
12544 user2 20 0 354356 25056 2556 R 5.3 0.3 0:00.79 php-fpm: pool user2
12673 user7 20 0 421236 44516 3368 D 5.3 0.6 0:00.48 /usr/sbin/httpd -DFOREGROUND
12677 user8 20 0 340940 13040 3168 R 5.3 0.2 0:00.17 php-fpm: pool user8
12713 user9 20 0 347064 17836 2752 D 5.3 0.2 0:00.40 php-fpm: pool user9
45 root 20 0 0 0 0 R 4.3 0.0 110:26.57 [kswapd0]
11675 user10 20 0 411076 37676 2616 R 4.3 0.5 0:00.59 /usr/sbin/httpd -DFOREGROUND
11800 user6 20 0 347240 17596 2220 R 4.3 0.2 0:01.02 php-fpm: pool user6
11930 apache 20 0 417204 43612 4064 S 4.3 0.5 0:00.87 /usr/sbin/httpd -DFOREGROUND
12077 user11 20 0 429928 54948 2964 R 4.3 0.7 0:00.83 /usr/sbin/httpd -DFOREGROUND
12175 user12 20 0 415200 40060 3504 R 4.3 0.5 0:00.64 /usr/sbin/httpd -DFOREGROUND
12190 user13 20 0 366644 38268 2200 S 4.3 0.5 0:00.77 php-fpm: pool user13
Connection counts:
1 114.119.152.164
1 138.199.36.210
1 17.121.114.63
1 178.85.80.125
1 185.186.161.252
1 185.30.177.162
1 185.30.179.42
1 194.110.203.45
1 2001
1 221.13.140.88
1 44.203.181.79
1 51.222.253.16
1 54.36.148.125
1 54.36.148.215
1 66.249.70.47
1 83.138.199.120
1 89.200.205.34
2 103.168.214.218
2 37.97.206.65
2 62.83.207.46
2 94.213.40.124
3 37.162.31.165
3 62.194.40.235
3 92.66.139.169
4 126.227.228.23
4 5.88.238.63
5 212.121.96.163
15 127.0.0.1
252 13.82.63.184
271 188.166.201.130
IP '188.166.201.130' currently has '270' connections
Connection info for '188.166.201.130':
tcp 0 0 OurIPv4:36348 188.166.201.130:443 TIME_WAIT
We tested tcpdump using the following command on our cellphones on mobile data, with results that were not helpful in any regard:
tcpdump -i eth0 -n dst host 37.19.221.163
Last edited: