@skaye, I am a little confused.. Why would you want all IP’s that happen to try an invalid (or blacklisted) login name to have their IP blocked PERMANENTLY, in addition to already being locked out by their use of a bad username? Personally, I would NOT want that to happen, and would protest loudly if every IP trying a bad username was autoblocked forver.
One thing to realize is that many or most of these attempts are running scripts that arrive on batches of Proxy or VPN IPs. Their are not actually the originating IP-address. The attacker does not use his own IP address.. Just like burglars at your house do not leave their own business cards behind.
In many other cases, the requests could be arriving on dynamically allocated IPs. Think phone-company and in some countries local ISP IPs.. Random and changing DHCP allocation of IPs. Used by Mr. bad guy today, used by Ms. Buy-Pretty-Clothes tomorrow.
That’s why you frequently see the same screwy login name being attempted from IP’s belonging to a multitude of countries at almost the same time. 10-15 countries do not actually decide to attack you at the same time. It is one robotic attack, that COULD be originating as close as your neighbors house, but passing its traffic through Proxy or VPN servers around the world. (Companies like HideMyAss and iPredator sell this type of access in batches of hundreds or even thousands of IP addresses at a time for spammer and hacker use).
So if invalid or brute-force attempts are not blocked by the firewall as attempts, then you have a concern. But you typically don’t really want every single VPN/proxy service blocked individually automatically, as a valid user might arrive on it the next hour.
If a whois shows that the attack originates from a bad IP range (Hertzner hosting, AWS cloud, …), then it is better to simply block the whole range, assuring that all their traffic is blocked. (Valid users do not come out of bad server hosting).
Blocking individual IP’s one at a time because of what is frequently a temporary infraction (IP level speaking) is simply not the way to go about it.
BTW.. That use of Proxies and VPNs is also why country-blocking (blocking a whole country at a time) is typically a poor idea. “Countries” do not attack. People do.
And the ACTUAL, final hacker-user of that set of proxies, spread all over the world, can just as easily sit in your own backyard, or in Canada, as he can in China or Moldovia. And some normal visitors, because they do not understand the realities of proxies and VPN buy or use these services as well.
Either because some fool told them it makes their traffic more secure or secret, or because they are trying to skirt licensing issues. Such as a Canadian/US users wanting to watch British BBC licensed programming by hiding behind a British proxy IP address.
Botton-line, though.. I’ll thank the Wordfence team to not automatically block every IP permanently, just because of a bad username use.