I hope I'm in the right place I'm having a notification from my VPS server about a High load with apachestatus.html file containing some info as below
Srv PID Acc M CPU SS Req Dur Conn Child Slot Client Protocol VHost Request
0-5 30706 4/420/7207 K 74.78 2 276 6462984 19.8 8.93 330.71 162.158.134.120 http/1.1 site1.example.com:443 GET /auth/signin HTTP/1.1
0-5 30706 0/417/7174 W 74.58 0 0 6900859 0.0 12.54 333.76 172.68.118.172 http/1.1 site1.example.com:443 POST /auth/signin HTTP/1.1
0-5 30706 4/408/7155 K 74.77 2 327 6759891 19.4 8.37 253.45 172.70.131.21 http/1.1 site1.example.com:443 POST /auth/signin HTTP/1.1
0-5 30706 0/503/7197 _ 74.66 5 426 6972175 0.0 10.28 374.51 141.101.68.26 http/1.1 site1.example.com:443 POST /auth/signin HTTP/1.1
0-5 30706 1/399/7251 K 74.77 2 266 6528061 8.1 14.55 291.27 172.69.69.41 http/1.1 site1.example.com:443 POST /auth/signin HTTP/1.1
0-5 30706 0/476/7234 _ 74.64 5 523 6451687 0.0 10.01 262.18 172.68.118.76 http/1.1 site1.example.com:443 GET /auth/signin HTTP/1.1
0-5 30706 2/434/7173 K 74.76 3 265 6972079 12.3 11.78 306.76 108.162.242.9 http/1.1 site1.example.com:443 POST /auth/signin HTTP/1.1
0-5 30706 1/425/7154 K 74.76 3 476 6313351 7.6 9.34 342.79 162.158.118.180 http/1.1 site1.example.com:443 GET /auth/signin HTTP/1.1
0-5 30706 1/414/7221 K 74.81 0 720 6698788 8.1 9.59 273.30 162.158.62.32 http/1.1 site1.example.com:443 POST /auth/signin HTTP/1.1
0-5 30706 0/468/7240 _ 74.60 8 586 7918329 0.0 10.25 293.01 172.69.69.199 http/1.1 site1.example.com:443 POST /auth/signin HTTP/1.1
0-5 30706 0/425/7207 _ 74.61 7 248 6691162 0.0 10.99 414.17 172.70.222.194 http/1.1 site1.example.com:443 GET /auth/signin HTTP/1.1
0-5 30706 6/411/7239 K 74.82 0 955 6807718 27.3 10.01 357.15 172.69.69.185 http/1.1 site1.example.com:443 GET /auth/signin HTTP/1.1
0-5 30706 1/452/7217 K 74.81 0 1123 6568176 8.1 10.20 293.10 172.70.110.180 http/1.1 site1.example.com:443 POST /auth/signin HTTP/1.1
0-5 30706 2/414/7224 K 74.80 1 369 7153413 11.4 11.21 331.23 172.70.82.54 http/1.1 site1.example.com:443 GET /auth/signin HTTP/1.1
0-5 30706 1/402/7203 K 74.74 4 566 6535237 8.1 7.79 263.32 172.70.114.138 http/1.1 site1.example.com:443 POST /auth/signin HTTP/1.1
0-5 30706 2/428/7259 K 74.76 4 717 6779567 11.9 11.26 392.65 172.70.178.78 http/1.1 site1.example.com:443 GET /auth/signin HTTP/1.1
0-5 30706 2/416/7125 K 74.76 3 527 6258884 12.3 9.67 251.22 162.158.134.142 http/1.1 site1.example.com:443 POST /auth/signin HTTP/1.1
0-5 30706 0/422/7143 _ 74.69 2 849 6620206 0.0 25.50 448.90 141.101.69.169 http/1.1 site1.example.com:443 GET /yf3q920TPF? HTTP/1.1
0-5 30706 0/395/7124 _ 74.64 6 494 6426369 0.0 132.05 358.19 172.70.54.252 http/1.1 site1.example.com:443 GET /auth/signin HTTP/1.1
0-5 30706 0/417/7151 _ 74.67 4 1589 6614715 0.0 10.91 286.53 108.162.216.190 http/1.1 site1.example.com:443 POST /auth/signin HTTP/1.1
0-5 30706 0/399/7163 _ 74.67 3 1056 6955007 0.0 7.52 291.21 172.70.54.2 http/1.1 site1.example.com:443 POST /auth/signin HTTP/1.1
0-5 30706 0/409/7272 W 74.55 2 0 6460489 0.0 26.08 257.75 172.70.54.16 http/1.1 site1.example.com:443 POST / HTTP/1.1
0-5 30706 2/438/7279 K 74.82 0 927 6925756 11.4 15.17 278.39 172.70.127.11 http/1.1 site1.example.com:443 GET /auth/signin HTTP/1.1
0-5 30706 0/399/7107 _ 74.61 8 683 6887484 0.0 9.19 385.11 172.70.130.56 http/1.1 site1.example.com:443 POST /auth/signin HTTP/1.1
0-5 30706 0/427/7302 W 74.60 0 0 7626256 0.0 10.43 305.48 127.0.0.1 http/1.1 server.example.com:80 GET /whm-server-status HTTP/1.1
1-5 30734 0/391/7145 _ 72.13 2 869 6507383 0.0 8.44 312.92 172.70.54.2 http/1.1 site1.example.com:443 POST /auth/signin HTTP/1.1
1-5 30734 1/406/7146 K 72.16 4 2000 7151012 87.6 9.10 435.53 172.71.114.58 http/1.1 site2.example.com:443 POST / HTTP/1.1
It looks like an attack but its source is "Cloudflare IPs"
(I'm using CloudFlare service to protect my websites)
How can I prevent this from happening again