• Resolved mrppp

    (@mrppp)


    If i do not have a static IP address. and i want to block all login attemps i.e i do not want anyone registering or login to my site (apart from me)Should i use the following code in CUSTOM CODE BOTTOM HOTLINKING/FORBID COMMENT SPAMMERS/BLOCK BOTS/BLOCK IP/REDIRECT CODE

    # Protect wp-login.php from Brute Force Login Attacks based on Server Protocol or IP
    # All legitimate humans and bots should be using Server Protocol HTTP/1.1
    RewriteCond %{REQUEST_URI} ^/wp-login\.php$
    RewriteCond %{THE_REQUEST} HTTP/1\.0 [OR]
    RewriteCond %{REMOTE_ADDR} !^xxx\.xxx\.xxx\.$
    RewriteRule ^(.*)$ - [F,L]

    http://wordpress.org/plugins/bulletproof-security/

Viewing 11 replies - 1 through 11 (of 11 total)
  • Thread Starter mrppp

    (@mrppp)

    maybe not 403 Forbidden Error Page on logout

    maybe this remove the ip address seems to work

    # Protect wp-login.php from Brute Force Login Attacks based on Server Protocol
    # All legitimate humans and bots should be using Server Protocol HTTP/1.1
    RewriteCond %{REQUEST_URI} ^/wp-login\.php$
    RewriteCond %{THE_REQUEST} HTTP/1\.0
    RewriteRule ^(.*)$ - [F,L]

    Plugin Author AITpro

    (@aitpro)

    Source: http://forum.ait-pro.com/forums/topic/protect-login-page-from-brute-force-login-attacks/

    # Add your Public IP Address using 2 or 3 octets so that if/when
    # your IP address changes it will still be in your subnet range. If you
    # have a static IP address then use all 4 octets.
    # Examples: 2 octets: 65.100. 3 octets: 65.100.50. 4 octets: 65.100.50.1
    Allow from 65.100.50.

    Thread Starter mrppp

    (@mrppp)

    So use `# Protect wp-login.php from Brute Force Login Attacks based on Server Protocol or IP
    # All legitimate humans and bots should be using Server Protocol HTTP/1.1
    RewriteCond %{REQUEST_URI} ^/wp-login\.php$
    RewriteCond %{THE_REQUEST} HTTP/1\.0 [OR]
    RewriteCond %{REMOTE_ADDR} !^xxx\.xxx\.xxx\.$
    RewriteRule ^(.*)$ – [F,L]`
    and this bit `
    RewriteCond %{REMOTE_ADDR} !^xxx\.xxx\.xxx\.$`

    as you mention above use two octets

    Thread Starter mrppp

    (@mrppp)

    # Protect wp-login.php from Brute Force Login Attacks based on IP Address
    <FilesMatch "^(wp-login\.php)">
    Order Allow,Deny
    # Add your website domain name
    Allow from example.com
    # Add your website/Server IP Address
    Allow from 69.200.95.1
    # Add your Public IP Address using 2 or 3 octets so that if/when
    # your IP address changes it will still be in your subnet range. If you
    # have a static IP address then use all 4 octets.
    # Examples: 2 octets: 65.100. 3 octets: 65.100.50. 4 octets: 65.100.50.1
    Allow from 65.100.50.
    </FilesMatch>
    Plugin Author AITpro

    (@aitpro)

    You can use the original code you posted and then use either 2 or 3 octets depending on how many octets your ISP dynamically changes in your IP address. Usually you can use 3 octets and the 4th octet is the only thing that changes.

    Thread Starter mrppp

    (@mrppp)

    this gave a 403 error

    # Protect wp-login.php from Brute Force Login Attacks based on Server Protocol or IP
    # All legitimate humans and bots should be using Server Protocol HTTP/1.1
    RewriteCond %{REQUEST_URI} ^/wp-login\.php$
    RewriteCond %{THE_REQUEST} HTTP/1\.0 [OR]
    RewriteCond %{REMOTE_ADDR} !^xxx\.xxx\.xxx\.$
    RewriteRule ^(.*)$ - [F,L]

    but this was ok

    # Protect wp-login.php from Brute Force Login Attacks based on Server Protocol or IP
    # All legitimate humans and bots should be using Server Protocol HTTP/1.1
    RewriteCond %{REQUEST_URI} ^/wp-login\.php$
    RewriteCond %{THE_REQUEST} HTTP/1\.0 [OR]
    RewriteRule ^(.*)$ - [F,L]

    is the latter what you refer to as Server Protocol based Brute Force Login Protection code

    Plugin Author AITpro

    (@aitpro)

    did you add your IP address?

    Plugin Author AITpro

    (@aitpro)

    This is the code we use on several testing websites. You do not even need to use the Server Protocol condition if you are blocking by IP address since only your IP address range is allowed to access the Login page.

    # Protect wp-login.php from Brute Force Login Attacks
    <FilesMatch "^(wp-login\.php)">
    Order Allow,Deny
    # Add your Domain
    Allow from ait-pro.com
    # Add your Server/Website IP Address
    Allow from 173.201.92.1
    # Add your Public/ISP IP Address
    Allow from x.x.x.
    </FilesMatch>
    Thread Starter mrppp

    (@mrppp)

    thanks so Allow from 173.201.92.1 is my server IP (ip obviously different)

    and this Allow from x.x.x. my ip with two or three octets
    say eg
    Allow from 31.53.

    Plugin Author AITpro

    (@aitpro)

    Yes, that is our Server/Website IP address. Add your Server/Website IP address instead. You will find that on the BPS System Info page.

    Yes, that is 2 octets.

    Thread Starter mrppp

    (@mrppp)

    thanks will try that out

Viewing 11 replies - 1 through 11 (of 11 total)

The topic ‘Brute Force’ is closed to new replies.