Although unfortunate on the one hand, it is perhaps a good omen on the other. Grammar Captive is under cyber siege. Certianly, it is not clearly understood whether the attack is against WordPress, and Grammar Captive is merely a source of collateral damage; or whether Grammar Captive is, indeed, the direct target. If it is the latter, then it is perhaps a compliment to Grammar Captive’s challenge to the world’s English language industry.
In any case, after the recent installation of the Matomo software, it was noticed that the subsequent placement of the opt-in/opt-out button for cookie-tracking on the Legal/Privacy panel of the Grammar Captive mainpage has led to strange behavior. Proof of the button’s effectiveness only occurs after the appearance of an internal server error and page refresh. Observance of this yet to be corrected, unwanted phenomenon led to an investigation that accidentally uncovered a likely attempt to crack the Grammar Captive WordPress password.
The evidence for this unfortunate attack was the many hundreds of hits within the space of a several minute interval on the Grammar Captive WordPress log-in page . The source of the attack was traced to mainland China and the following domain was blocked: 18.104.22.168.
According to the Who Is? page of the APNIC list of registered domains the source of the attack came from the Shangxi Province. China Unicom is the owner of the address and has been notified of the abuse.
The entire weekend was spent addressing this twin-problem and several more days will likely be required in an attempt to resolve the time and space issues resulting from the large amount of CPU time and memory that the Matomo software apparently requires and appear to be the source of the button dysfunction.