« Previous Blog Next Blog »  

Additional


Article created:- December 19, 2019 7:31 pm
Last modified:- July 16, 2021 12:35 pm

Written by:- MJS

Filed and cataloged as:- News, Reviews

Well this is a blast, (amended by Joe the Editor), my poorly website is being hammered with brute force attacks, coming in mainly from the XML-RPC facility on WordPress.

I know this because ‘Limit Login Attempts’ is logging them.

Limit Login Attempts Reloaded

Deactivate

Limit the rate of login attempts, including by way of cookies and for each IP address.

Version 2.10.0 | By WPChef | View details

Fifteen in the last 10 hours on 17/12/2018, with all of them being logged out after 2 failed attempts, but strangely enough: several of the blocked IPs are having another go an hour later.

{ Huff! }

But being as ‘Xng1px’ is my weird WordPress created username: then I feel quite confident that they’ll never even get it, to then begin the nasty hacking process.

I’ve tried: (unsuccessfully), to install a plug-in that hides my log in /wp-login.php file; with all sorts of problems with me trying to log back in. It is the way to go, but it’s not that easy to implement.

Update:- 23-08-2020. The venerable plugin that I was vainly attempting to use back then was called, WPS Hide Login, and several others were reporting the same issues that I had. Now, that’s not to say it’s a bad plugin, its just fiddly for the novice, especially if your .Htaccesss file is incorrectly set up.

Hummmm! – The one I’m currently trying out is called Webcraftic, and touch wood: I can still log into my site, but the wp-login.php file has been renamed. So that should kill off the shitty-web-bot cruisers, cruising the lanes for an open hole to play inside.

Webcraftic Hide login page

Settings | Deactivate

Hide wp-login.php login page and close wp-admin access to avoid hacker attacks and brute force.

Version 1.1.1 | By Webcraftic | View details

Continued:-

From the log that Limit Log in creates, .. I can see that well over 50% of the traffic was coming in on the XML-RPC channel, (that I don’t use), so in one foul stroke I’ve eliminated them by installing a rather neat plugin called, ..

Manage XML-RPC

Deactivate

Enable/Disable XML-RPC for IP specific control and disable XML-RPC Pingback method.

Version 1.0 | By brainvireinfo | View details

It happily turns off * ALL * of the XML-RPC traffic, including ping-backs (but only if you want that sharing feature disabled.)

I feel quite confident that I’m finally beating the spammy fuckers ..

 

Thanks for reading, Jessica: Praise be the ORI.

 

  « Previous Blog Next Blog »  
April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  

WARNING!

localStorage Cookie info. This website uses simple cookies, and even simpler localStorage structures. (Enabling dynamic functionality.) They are not used for any other purpose.

To view this book site, you must be considered as an ADULT (with legal consent) in your current location to proceed any further. Failure to comply, could result in a criminal prosecution (within the local domicile) that you physically reside.

Theses web-pages aren't for children, nor any childish attitudes towards sexual ambivalence.
It is for -- ADULTS ONLY!

Pressing [ No! ] - Will take you away, to another type of less salubrious activity, that's obviously more suited to your young tender age (and/or) delicate disposition.

Only press [ YES! ] if you understand the terms. After that, a one year cookie will be set on your browser, thusly declaring you to be an adult, (a constitutional time-Warrior), with all of your timely facilities intact.

It's a big decision that you're about to undertake, choose wisely: because you can never go back.