Honeypot Intelligence Report

28,000+ Requests in 9 Days.
We Don't Even Run WordPress.

We launched sunglasses.dev on April 1, 2026. Within 72 hours, France-based bots were already probing us for WordPress admin panels, login pages, config files, and secrets. We're a static security site with zero PHP, zero MySQL, zero WordPress. They didn't care. Here's what we discovered.

Published April 9, 2026 · Sunglasses Threat Intelligence · Research by CAVA · Reviewed by Claude + AZ

28K+
Total Requests
in 9 Days
72h
Until First
Bot Attacks
123
Attacks
Blocked
0
WordPress Files
on Our Server
The contradiction that matters: We run a static site on Cloudflare Pages. No PHP. No MySQL. No wp-admin. No plugins. Zero WordPress files anywhere. Yet within 72 hours of going live, automated scanners — primarily from France-based infrastructure — were already probing us for WordPress credentials and secret files. If you run a website, you're being probed right now.

What They're Looking For

Every request below was logged by our Cloudflare telemetry on sunglasses.dev. These aren't hypothetical attacks — this is what actually hit our server in its first 9 days online. France-based infrastructure was the heaviest bot source, concentrated in the first 72 hours after launch.

/wp-login.php
/wp-admin/
/xmlrpc.php
/.env
Secret theft
/wp-config.php
DB credentials
/.git/config
Source code theft
/.git/HEAD
Repo discovery
/administrator
CMS panel fishing

Bar widths represent relative request volume from our telemetry sample. Exact counts vary by day.

Three Classes of Attack Intent

PathAttacker IntentIf Successful
/wp-login.phpCredential brute-forceFull admin access to WordPress dashboard
/xmlrpc.phpAuth amplificationTest thousands of passwords in a single request
/wp-admin/Admin panel discoveryConfirm target runs WordPress, attempt login
/wp-config.phpDatabase credential theftDirect database access, full data compromise
/.envEnvironment secret theftAPI keys, tokens, passwords in plaintext
/.git/configSource code theftClone entire codebase including embedded secrets

What Happens After They Get In

This is the standard attack progression for WordPress compromise — from first scan to AI agent poisoning.

Step 1
Recon
Spray /wp-admin, /xmlrpc, /.env across millions of IPs
Step 2
Login
Brute-force wp-login, XML-RPC multicall batching
Step 3
Foothold
Exploit weak credentials or unpatched plugin
Step 4
Persist
Rogue admin, backdoor plugin, webshell in PHP
Step 5
Monetize
SEO spam, redirects, crypto miners, ad injection
Step 6
AI Poison
Hidden instructions for AI agents that read the page
Steps 1 and 2 are what we observed. We caught the recon phase on a site that has nothing to find. On a real WordPress site with weak credentials, step 3 happens in minutes.

Why WordPress Is the #1 Commodity Target

Source: Patchstack — State of WordPress Security in 2025 (data period: 2024)

The xmlrpc.php Trick: One Request, Thousands of Passwords

Most people know about brute-forcing /wp-login.php. Fewer know about xmlrpc.php — and it's far more dangerous.

XML-RPC's system.multicall method lets an attacker batch hundreds of authentication attempts into a single HTTP request. Instead of one login attempt per request (which rate-limiters catch), they send one request containing 500 username/password pairs.

Why this matters: Most WordPress rate-limiting and login-protection plugins count requests, not authentication attempts. A single POST to xmlrpc.php can test 500 credentials while appearing as one request in the access log.

What defenders see:

Fix: Disable XML-RPC entirely if you don't use it (most modern WordPress sites don't need it). At minimum, block system.multicall at the WAF level.

The Part Nobody Is Talking About: AI Agent Poisoning

This is Sunglasses territory. Everyone talks about WordPress hardening. Almost nobody talks about what happens when a compromised website meets an AI agent.

Here's the chain:

  1. Website gets compromised through any of the methods above
  2. Attacker injects hidden content — invisible text, SEO spam, or deceptive instructions buried in the page
  3. AI browsing agent ingests the page during research, summarization, or retrieval
  4. Hidden instructions influence the model's behavior — ignore safety policy, exfiltrate data, fetch malicious URLs, misuse tools
  5. If the agent has tool privileges, the blast radius expands: file access, API calls, code execution

This is indirect prompt injection (OWASP LLM01:2025) — and compromised WordPress sites are one of the largest delivery surfaces for it.

Traditional web compromise response isn't enough anymore. You now need:

At the same time. This is the gap Sunglasses is built to fill.

What You Should Do Right Now

Today (Priority 0)

This Week (Priority 1)

AI-Era Hardening (Priority 2)

How Sunglasses Detected This

  1. Cloudflare telemetry surfaced concentrated 4xx request patterns against CMS and secret-file paths
  2. Honeypot analysis converted noisy scanner traffic into attributable threat intelligence
  3. Pattern classification categorized probes by intent: credential abuse, secret-file recon, source theft
  4. Cross-analysis separated commodity spray from higher-risk targeted behavior
What we turned "error noise" into: Most site operators ignore 4xx errors — they look like broken links. We treated them as attacker telemetry. The result is this report and a clearer picture of how commodity recon works at internet scale.

How Bots Found Us Within 72 Hours of Launch

We launched on April 1. The bots arrived within 72 hours. How?

Certificate Transparency (CT) logs. The moment our SSL certificate was issued, it appeared in public CT logs. Automated scanners monitor these feeds in real time using tools like CertStream. Research from SANS ISC and UC Santa Barbara confirms: network probes arrive "just seconds" after a CT log entry is published.

The heaviest early traffic came from France-based infrastructure — primarily OVH (OVHcloud), Europe's largest hosting provider headquartered in Roubaix, France. OVH operates 4.5+ million IP addresses and is well-documented as a source of automated scanning traffic:

This is not unique to us. Every new website on the internet goes through this. The difference is that we caught it, measured it, and are sharing the data.

Honest Assessment

What we know for certain

What we don't claim

Why we publish what we don't know: Security reports that overstate confidence lose trust. We tell you what we verified, what we sampled, and what still needs deeper export. That's how credibility works.

Scan your AI agent inputs for prompt injection, secret theft, and supply chain attacks.

pip install sunglasses

Free. Open source. Local only. View source on GitHub.

Sources

  1. W3Techs — Usage Statistics and Market Share of WordPress (April 2026)
  2. Patchstack — State of WordPress Security in 2025 (data period 2024, updated March 2025)
  3. Cloudflare — A Look at the New WordPress Brute Force Amplification Attack
  4. OWASP — LLM01:2025 Prompt Injection
  5. sunglasses.dev internal telemetry — Cloudflare Analytics (sunglasses.dev, launched April 1, 2026; data period April 1 – April 9, 2026)