Not sure if this was identified, but I found this in my logs previously.
This mob Bucklog, was one of the offenders, literally hitting me thousands of times. They don't hit your domain, they hit your server IP directly, so Cloudflare or AS blocking, won't work. You have to block the CIDR ranges for their two servers in your server firewall, so it drops those IP's immediately and doesn't consume your PHP / DB resources.
170.39.217.0/24
185.177.72.0/24
It took me a while, because I had the AS blocked at Cloudflare, but they were still hitting the server. So then I thought they were routing through a non-proxied sub-domain on Cloudflare, grey, but that wasn't it either. Basically after sifting through lots of logs, found they were hitting the server IP directly and they are known for being nasty.
- Owner/ASN: Bucklog SARL (AS211590), hosted in France (often listed as Paris area or Vélizy-Villacoublay).
- Reputation: This entire /24 (185.177.72.0/24) is heavily flagged across threat intel sources (AbuseIPDB, CleanTalk, CrowdSec, SOCRadar, etc.) for spam, brute-force attacks, hacking attempts (e.g., probing /info.php.bak, common vuln paths), reconnaissance/scanning (e.g., Next.js metadata probing), and general malicious activity. It's been active in reports since mid-2025 and continues into 2026. High confidence of abuse—many sources treat the whole subnet as noisy/malicious background noise or bot/scanner traffic.
I had more than this doing it, but this was the main offender, showing thousands of visitors in my site at times. They were hitting me, then stopping, then hitting me, stopping. The CPU and DB loads were going insane. Again, not just this one, I had others in the thousands as well, but some of them were via the domain, so I could block them at the edge in CF, and some were doing similar, direct to the server IP and had to be blocked at the server firewall instead to drop immediately.