• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • We are looking for U.S.-based freelancer or agency working with SEO or WordPress for a quick 30-min interviews to gather feedback on XOVI, a successful German SEO tool we’re looking to launch in the U.S.
    If you qualify and participate, you’ll receive a $30 Amazon gift card as a thank-you. Please apply here. Thanks for helping shape a better SEO product for agencies!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Question Extremely high traffic via http/s

JogoVogo

Basic Pleskian
Server operating system version
os_Debian 12.0
Plesk version and microupdate number
Plesk Obsidian v18.0.65_build1800241106.13
Good day everyone!

On our server, a domain generates about two terabytes of traffic daily.

It is a WP website whose graphics are quite small. There are also no unknown files in the directory(s).

In addition, the WA statistics do not make a reasonable statement about traffic. What is the most effective way to analyze them?

Cheers
Ron
 
Have you checked the access_ssl_log lines for the occurrence of " 404 " and " 301 " entries? Do you find any and if so, could you post an example here?
 
I didn't expect that. A WP websites without any 301 or 404 entries in the log sounds rare, because normally bad bots are trying the website. Is your question then where the traffic originates? You could find the top sources with
cat access_ssl_log | awk '{print $1}' | sort -n | uniq -c | sort -n
 
When outputting "cat" there are 17 IPs.

In the access_ssl_log.processed are many "57995 access forbidden by rule, client:" entries.
 
And do the 17 source IP make sense? And why are there only 17? There should be hundreds. Is there an IP address that creates most traffic? What source is that (look it up on centralops.net maybe)? Which IP address is hitting files that are not for public access? Why is it not being banned by your Fail2Ban? Or is it?
 
In the proxy_access_ssl_log Are significantly more entries.
There are none of them at ipban.

The one with the most hits I have checked at talos everything in order...
 
If you use a CDN, the IP address seen by Fail2Ban is not the visitor IP address that might be logged.

Did you check the Web Statistics?
1732104368644.png
You will have to use the system user and password to access the page.
 
That doesn't look very bad. How does it compare to previous months?

Where do you see the 14.3GB? Do you have multiple domains in the same webspace/subscription? The Statistics from the screenshot are solely for that domain while the Traffic this month refers to all the websites in that webspace/subscription.

What disk space and traffic show?
1732107992217.png
 
Oh yes, I was really mistaken. Despite all this, 14GB is too much for this one domain so far.

2TB/month is for the entire subscription/customers. (36 Domains)

Ron
 
You will have to check all 36 domains to identify the domain that receives all that traffic. It can't be the one you are currently looking at.
 
Back
Top