BlogHue, any opinion on WordFence?
90k IP addresses? I don't think so.
don't block the bots, deny all and just allow your ISP range.
i do this as well in iptables for ssh and ftp. works great.
BlogHue, any opinion on WordFence?
90k IP addresses? I don't think so.
It looks good. However, if you're running a few hundred sites - signing up for their API everytime could get tiresome. Also, I don't like my sites making unnecessary outgoing connections all the time.
----
P.S - Got more info on the Hacks... Apparently, a new user is created and administration roles are changed. Followed by probably, from what I can gain, an upload of a Shell Script, which then further modifies the traditional wp-login.php
This is what it looks like once the hack is successful.
![]()
Silly hobbster, you're website files are on servers on the ground? My website files are in the cloud. A botnet doesn't have wings...
Carry on...
If you have any kind of decent hosting, then 5 failed attempts to login to anything, not just WP, should cause the IP to be blocked.
SecAction phase:1,nolog,pass,initcol:ip=%{REMOTE_ADDR},initcol:user=%{REMOTE_ADDR},id:5000134
<Locationmatch "/wp-login.php">
# Setup brute force detection.
# React if block flag has been set.
SecRule user:bf_block "@gt 0" "deny,status:401,log,id:5000135,msg:'ip address blocked for 5 minutes, more than 5 login attempts in 3 minutes.'"
# Setup Tracking. On a successful login, a 302 redirect is performed, a 200 indicates login failed.
SecRule RESPONSE_STATUS "^302" "phase:5,t:none,nolog,pass,setvar:ip.bf_counter=0,id:5000136"
SecRule RESPONSE_STATUS "^200" "phase:5,chain,t:none,nolog,pass,setvar:ip.bf_counter=+1,deprecatevar:ip.bf_counter=1/180,id:5000137"
SecRule ip:bf_counter "@gt 5" "t:none,setvar:user.bf_block=1,expirevar:user.bf_block=3600,setvar:ip.bf_counter=0"
</locationmatch>
not sure if you understand what the cloud is or not..... but you are still sexy in my book. *hump*
if ( ! logged_in && failed_attempts > 5) {
// block IP
} else if ( ! logged_in) {
failed_attempts++;
sleep(3);
// handle response
}
If everyone is running one bit of (poorly made) software, use something else.
^ static html sounds good to me for most sites.
don't block the bots, deny all and just allow your ISP range.
i do this as well in iptables for ssh and ftp. works great.
Sure, I'll just let my clients know they need to subscribe to my ISP![]()
You just worked out how to take your site offline.
P.S - Got more info on the Hacks... Apparently, a new user is created and administration roles are changed. Followed by probably, from what I can gain, an upload of a Shell Script, which then further modifies the traditional wp-login.php
This is what it looks like once the hack is successful.