HEX
Server: Apache
System: Linux host11.registrar-servers.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
User: robovet (12567)
PHP: 7.2.34
Disabled: NONE
Upload Files
File: //home/robovet/mail/new/1719226989.M57686P3937302.host11.registrar-servers.com,S=5509,W=5615
Return-Path: <>
Delivered-To: [email protected]
Received: from host11.registrar-servers.com
	by host11.registrar-servers.com with LMTP
	id YGSxAm1SeWYWFDwAMOv5Ig
	(envelope-from <>)
	for <[email protected]>; Mon, 24 Jun 2024 07:03:09 -0400
Return-path: <>
Envelope-to: [email protected]
Delivery-date: Mon, 24 Jun 2024 07:03:09 -0400
Received: from mailnull by host11.registrar-servers.com with local (Exim 4.96.2)
	id 1sLhTZ-00Gn2R-04
	for [email protected];
	Mon, 24 Jun 2024 07:03:09 -0400
X-Failed-Recipients: [email protected]
Auto-Submitted: auto-replied
From: Mail Delivery System <[email protected]>
To: [email protected]
References: <[email protected]>
Content-Type: multipart/report; report-type=delivery-status; boundary=1719226989-eximdsn-1120069207
MIME-Version: 1.0
Subject: Mail delivery failed: returning message to sender
Message-Id: <[email protected]>
Date: Mon, 24 Jun 2024 07:03:09 -0400

--1719226989-eximdsn-1120069207
Content-type: text/plain; charset=us-ascii

This message was created automatically by mail delivery software.

A message that you sent could not be delivered to one or more of its
recipients. This is a permanent error. The following address(es) failed:

  [email protected]
    Message discarded as high-probability spam

--1719226989-eximdsn-1120069207
Content-type: message/delivery-status

Reporting-MTA: dns; host11.registrar-servers.com

Action: failed
Final-Recipient: rfc822;[email protected]
Status: 5.0.0

--1719226989-eximdsn-1120069207
Content-type: message/rfc822

Return-path: <[email protected]>
Received: from robovet by host11.registrar-servers.com with local (Exim 4.96.2)
	(envelope-from <[email protected]>)
	id 1sLhTV-00GmwK-2A
	for [email protected];
	Mon, 24 Jun 2024 07:03:05 -0400
To: [email protected]
Subject: =?us-ascii?Q?[Wordfence_Alert]_www.robovet.com_Increased_Att?=  =?us-ascii?Q?ack_Rate?=
X-PHP-Script: www.robovet.com/wp-cron.php for 198.54.126.134, 198.54.126.134, 198.54.126.134
X-PHP-Filename: /home/robovet/public_html/wp-cron.php REMOTE_ADDR: 198.54.126.134
Date: Mon, 24 Jun 2024 11:03:05 +0000
From: WordPress <[email protected]>
Message-ID: <[email protected]>
X-Mailer: PHPMailer 6.5.0 (https://github.com/PHPMailer/PHPMailer)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Sender:  <[email protected]>

This email was sent from your website "Robovet" by the Wordfence plugin at Monday 24th of June 2024 at 11:03:05 AM
The Wordfence administrative URL for this site is: https://www.robovet.com/wp-admin/admin.php?page=Wordfence
The Wordfence Web Application Firewall has blocked 107 attacks over the last 10 minutes.

Wordfence is blocking these attacks, and we're sending this notice to make you aware that there is a higher volume of the attacks than usual. Additionally, the Wordfence Real-Time IP Blocklist can block known attackers' IP addresses automatically for Premium users, including any probing requests that may not be malicious on their own. All Wordfence users can also opt to block the attacking IPs manually if desired. As always, be sure to watch your scan results and keep your plugins, themes and WordPress core version updated.

Below is a sample of these recent attacks:
June 24, 2024 11:03am  94.156.64.75 (Bulgaria)     Blocked for Known malicious User-Agents
June 24, 2024 11:02am  94.156.64.75 (Bulgaria)     Blocked for Known malicious User-Agents
June 24, 2024 11:02am  94.156.64.75 (Bulgaria)     Blocked for Known malicious User-Agents
June 24, 2024 11:02am  94.156.64.75 (Bulgaria)     Blocked for Known malicious User-Agents
June 24, 2024 11:02am  94.156.64.75 (Bulgaria)     Blocked for Known malicious User-Agents
June 24, 2024 11:02am  94.156.64.75 (Bulgaria)     Blocked for Known malicious User-Agents
June 24, 2024 11:02am  94.156.64.75 (Bulgaria)     Blocked for Known malicious User-Agents
June 24, 2024 11:02am  94.156.64.75 (Bulgaria)     Blocked for Known malicious User-Agents
June 24, 2024 11:02am  94.156.64.75 (Bulgaria)     Blocked for Known malicious User-Agents
June 24, 2024 11:01am  94.156.64.75 (Bulgaria)     Blocked for Known malicious User-Agents
	NOTE: You are using the free version of Wordfence. Upgrade today:
 - Receive real-time Firewall and Scan engine rule updates for protection as threats emerge
 - Real-time IP Blocklist blocks the most malicious IPs from accessing your site
 - Country blocking
 - IP reputation monitoring
 - Schedule scans to run more frequently and at optimal times
 - Access to Premium Support
 - Discounts for multi-year and multi-license purchases

Click here to upgrade to Wordfence Premium:
https://www.wordfence.com/zz1/wordfence-signup/
--
To change your alert options for Wordfence, visit:
https://www.robovet.com/wp-admin/admin.php?page=Wordfence&subpage=global_options
To see current Wordfence alerts, visit:
https://www.robovet.com/wp-admin/admin.php?page=Wordfence



No longer an administrator for this site? Click here to stop receiving security alerts: https://www.robovet.com/?_wfsf=removeAlertEmail&jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJlbWFpbCI6Im5laWxkYXZpZDEyM0BnbWFpbC5jb20iLCJfZXhwIjoxNzE5ODMxNzg1fQ.JhdS6IoBswDBv_Mx7v72P_-CjPvJzPTbP0PwzzKES3E


--1719226989-eximdsn-1120069207--