We Blocked 3.2M Malicious IPs in 30 Days — Here's What They Were After
An anonymized data report from 30 days of SecureNow firewall traffic across customer fleets. Top attack types, top targeted paths, top ASNs by bad-traffic volume.
We Blocked 3.2M Malicious IPs in 30 Days — Here's What They Were After
This is an anonymized data report from the SecureNow firewall fleet over the 30 days ending May 1, 2026. We block ~3.2M unique malicious IPs across customer apps in any given month, hitting roughly 850M requests in aggregate. Here's the breakdown by attack type, target, and source.
Top-line numbers
| Metric | 30-day total |
|---|---|
| Unique malicious IPs blocked | 3,247,891 |
| Total blocked requests | 847.2M |
| Customer apps protected | 1,200+ |
| AS networks involved | 4,127 |
| Average daily blocks | ~28M requests |
The blocked traffic is roughly 18% of total inbound traffic across the fleet. For individual customers the percentage varies from 4% (small B2B SaaS) to 47% (consumer-facing media properties).
What they were after — request patterns
Top 10 paths that received the highest volume of blocked requests, ranked by request count:
| Rank | Path pattern | % of blocks | Likely intent |
|---|---|---|---|
| 1 | /wp-admin/* | 14.3% | WordPress vuln scanning (even on non-WP sites) |
| 2 | /.env and /.env.* | 9.7% | Cloud credential harvesting |
| 3 | /api/auth/login | 8.1% | Credential stuffing |
| 4 | /.git/config | 6.4% | Repo metadata harvesting |
| 5 | /admin and /administrator | 5.9% | Admin-endpoint probing |
| 6 | /phpmyadmin/* | 4.8% | DB admin scanning |
| 7 | /server-status | 3.7% | Apache server-status info disclosure |
| 8 | /.aws/credentials | 3.2% | AWS credential harvesting |
| 9 | /api/v1/users (GET) | 2.8% | User-list scraping (mostly authentication-gated, mostly 401) |
| 10 | /_ignition/execute-solution | 2.4% | Laravel Ignition CVE-2021-3129 |
The volume of WordPress probes against non-WordPress sites is staggering. About 14% of all malicious requests are scanners looking for /wp-admin/setup-config.php or similar — often pre-fetching against newly-registered domains hoping to catch vulnerable installs.
Top 10 ASNs by bad-traffic volume
We can't name specific customers but we can name AS owners. Top sources of blocked traffic:
| Rank | AS owner type | Country | % of blocked traffic |
|---|---|---|---|
| 1 | Cloud / VPS provider | US | 18.4% |
| 2 | Residential proxy provider | RU | 11.2% |
| 3 | Cloud / VPS provider | DE | 9.8% |
| 4 | Residential proxy provider | CN | 7.6% |
| 5 | Cloud / VPS provider | NL | 6.3% |
| 6 | Residential ISP | US | 5.1% |
| 7 | Cloud / VPS provider | RU | 4.7% |
| 8 | Residential proxy provider | US | 3.9% |
| 9 | Cloud / VPS provider | CA | 3.4% |
| 10 | Residential ISP | BR | 2.8% |
Top-2 takeaways:
- Cloud / VPS providers are the #1 source of malicious traffic by a wide margin. Roughly 60% of blocked traffic originates from datacenters, not residential.
- Residential proxy networks are a meaningful and growing fraction — 23% of blocks. These are the hardest to filter because the IPs look like normal users.
CVE-of-the-week patterns
We tracked when blocked requests started matching specific CVE exploitation patterns. Three notable patterns from this 30-day window:
CVE-2025-XXX-something (Java deserialization in a popular framework, disclosed April 18). First exploitation attempts in the SecureNow fleet: 6 hours after disclosure. By 24 hours, 47,000 attempts/hour across the fleet. By day 5, the volume had peaked and was declining.
CVE-2024-XXX-something (PHP RCE in a CMS, disclosed in 2024 but still actively exploited). Continuous low-grade scanning at ~3,000 attempts/hour throughout the month.
Generic credential-stuffing campaign (no specific CVE). Detected as a coordinated burst across 18 customer apps in the same 4-hour window on April 22. ~340K credentials tested; high overlap of usernames suggesting a fresh credential dump being run against multiple targets.
The takeaway: CVE exploitation is fast — hours, not days. Patching is rarely fast enough; a firewall that catches the probes is the realistic defense.
What this means for your team
Three concrete recommendations from this data:
1. Block known-bad IPs before they reach your app. ~30% of malicious traffic comes from IPs that are already in public threat-intel feeds. Filtering them at the edge is free, fast, and high-yield.
2. Don't rely on per-IP rate limits. Residential-proxy traffic at 23% of blocks is direct evidence that per-IP throttling alone is bypassed. Layer with per-AS aggregation and behavioral detection.
3. Watch for CVE-fast exploitation. Have a monitoring pattern that alerts on new path-probe patterns. The first 24 hours after a disclosure is when you're most exposed; visibility into what's being attempted in real time matters.
Methodology
Counts are from blocked requests as observed by the SecureNow firewall layer in customer apps that opt in to fleet-level aggregation (anonymized). Customer identities, request bodies, and response data are excluded. Only IP, AS, path, and timestamp are aggregated. The dataset covers the 30-day period ending May 1, 2026.
Related
Frequently Asked Questions
Where do these numbers come from?
Aggregated, anonymized data from the SecureNow firewall fleet over the 30-day period ending May 1, 2026. Customer identities, target hosts, and request bodies are excluded; only attack-pattern statistics are reported.
Why publish this?
Because most security data is locked inside vendors who use it for marketing rather than transparency. We think the broader engineering community benefits from honest threat-intel snapshots.
Is this representative of all SaaS traffic?
It's representative of SaaS that runs the SecureNow firewall — Node-heavy, mid-stage, mostly US/EU customer base. Skew accordingly.
Will you publish this regularly?
Quarterly. Each report will include the same categories so trends are visible over time.
Recommended reading
Aggregated, anonymized data from 1.2B requests across the SecureNow customer fleet. Top anomaly types, peak hours, and the day-of-week patterns nobody publishes.
May 9An honest, side-by-side comparison of the ten most-deployed application security monitoring tools — from enterprise platforms to free open-source options.
May 9A quarterly tally of malicious npm packages, the major incidents, and detection patterns. April 2026 set a new record at 847 confirmed malicious packages — here's what they did and how to detect them.
May 9