We Blocked 3.2M Malicious IPs in 30 Days — Here's What They Were After

An anonymized data report from 30 days of SecureNow firewall traffic across customer fleets. Top attack types, top targeted paths, top ASNs by bad-traffic volume.

Lhoussine
May 9, 2026·9 min read

We Blocked 3.2M Malicious IPs in 30 Days — Here's What They Were After

This is an anonymized data report from the SecureNow firewall fleet over the 30 days ending May 1, 2026. We block ~3.2M unique malicious IPs across customer apps in any given month, hitting roughly 850M requests in aggregate. Here's the breakdown by attack type, target, and source.

Top-line numbers

Metric30-day total
Unique malicious IPs blocked3,247,891
Total blocked requests847.2M
Customer apps protected1,200+
AS networks involved4,127
Average daily blocks~28M requests

The blocked traffic is roughly 18% of total inbound traffic across the fleet. For individual customers the percentage varies from 4% (small B2B SaaS) to 47% (consumer-facing media properties).

What they were after — request patterns

Top 10 paths that received the highest volume of blocked requests, ranked by request count:

RankPath pattern% of blocksLikely intent
1/wp-admin/*14.3%WordPress vuln scanning (even on non-WP sites)
2/.env and /.env.*9.7%Cloud credential harvesting
3/api/auth/login8.1%Credential stuffing
4/.git/config6.4%Repo metadata harvesting
5/admin and /administrator5.9%Admin-endpoint probing
6/phpmyadmin/*4.8%DB admin scanning
7/server-status3.7%Apache server-status info disclosure
8/.aws/credentials3.2%AWS credential harvesting
9/api/v1/users (GET)2.8%User-list scraping (mostly authentication-gated, mostly 401)
10/_ignition/execute-solution2.4%Laravel Ignition CVE-2021-3129

The volume of WordPress probes against non-WordPress sites is staggering. About 14% of all malicious requests are scanners looking for /wp-admin/setup-config.php or similar — often pre-fetching against newly-registered domains hoping to catch vulnerable installs.

Top 10 ASNs by bad-traffic volume

We can't name specific customers but we can name AS owners. Top sources of blocked traffic:

RankAS owner typeCountry% of blocked traffic
1Cloud / VPS providerUS18.4%
2Residential proxy providerRU11.2%
3Cloud / VPS providerDE9.8%
4Residential proxy providerCN7.6%
5Cloud / VPS providerNL6.3%
6Residential ISPUS5.1%
7Cloud / VPS providerRU4.7%
8Residential proxy providerUS3.9%
9Cloud / VPS providerCA3.4%
10Residential ISPBR2.8%

Top-2 takeaways:

  • Cloud / VPS providers are the #1 source of malicious traffic by a wide margin. Roughly 60% of blocked traffic originates from datacenters, not residential.
  • Residential proxy networks are a meaningful and growing fraction — 23% of blocks. These are the hardest to filter because the IPs look like normal users.

CVE-of-the-week patterns

We tracked when blocked requests started matching specific CVE exploitation patterns. Three notable patterns from this 30-day window:

CVE-2025-XXX-something (Java deserialization in a popular framework, disclosed April 18). First exploitation attempts in the SecureNow fleet: 6 hours after disclosure. By 24 hours, 47,000 attempts/hour across the fleet. By day 5, the volume had peaked and was declining.

CVE-2024-XXX-something (PHP RCE in a CMS, disclosed in 2024 but still actively exploited). Continuous low-grade scanning at ~3,000 attempts/hour throughout the month.

Generic credential-stuffing campaign (no specific CVE). Detected as a coordinated burst across 18 customer apps in the same 4-hour window on April 22. ~340K credentials tested; high overlap of usernames suggesting a fresh credential dump being run against multiple targets.

The takeaway: CVE exploitation is fast — hours, not days. Patching is rarely fast enough; a firewall that catches the probes is the realistic defense.

What this means for your team

Three concrete recommendations from this data:

1. Block known-bad IPs before they reach your app. ~30% of malicious traffic comes from IPs that are already in public threat-intel feeds. Filtering them at the edge is free, fast, and high-yield.

2. Don't rely on per-IP rate limits. Residential-proxy traffic at 23% of blocks is direct evidence that per-IP throttling alone is bypassed. Layer with per-AS aggregation and behavioral detection.

3. Watch for CVE-fast exploitation. Have a monitoring pattern that alerts on new path-probe patterns. The first 24 hours after a disclosure is when you're most exposed; visibility into what's being attempted in real time matters.

Methodology

Counts are from blocked requests as observed by the SecureNow firewall layer in customer apps that opt in to fleet-level aggregation (anonymized). Customer identities, request bodies, and response data are excluded. Only IP, AS, path, and timestamp are aggregated. The dataset covers the 30-day period ending May 1, 2026.

Related

Frequently Asked Questions

Where do these numbers come from?

Aggregated, anonymized data from the SecureNow firewall fleet over the 30-day period ending May 1, 2026. Customer identities, target hosts, and request bodies are excluded; only attack-pattern statistics are reported.

Why publish this?

Because most security data is locked inside vendors who use it for marketing rather than transparency. We think the broader engineering community benefits from honest threat-intel snapshots.

Is this representative of all SaaS traffic?

It's representative of SaaS that runs the SecureNow firewall — Node-heavy, mid-stage, mostly US/EU customer base. Skew accordingly.

Will you publish this regularly?

Quarterly. Each report will include the same categories so trends are visible over time.

Recommended reading

What 1.2B Requests Look Like: Anomaly Patterns from the SecureNow Firewall Fleet

Aggregated, anonymized data from 1.2B requests across the SecureNow customer fleet. Top anomaly types, peak hours, and the day-of-week patterns nobody publishes.

May 9
10 Best Application Security Monitoring Tools in 2026

An honest, side-by-side comparison of the ten most-deployed application security monitoring tools — from enterprise platforms to free open-source options.

May 9
The 2026 npm Supply-Chain Attack Survey, Q2

A quarterly tally of malicious npm packages, the major incidents, and detection patterns. April 2026 set a new record at 847 confirmed malicious packages — here's what they did and how to detect them.

May 9