Login attempt bypass Wordfence
-
I’m having a several login attempts from Russia. I use the option “Immediately lock out invalid usernames”. Today, an entry appeared on the Top 5 Failed Logins in the Dashboard. I checked the host log and this is what I found.
A normal blocked attempt:
128.70.88.94 - - [19/Sep/2015:03:58:08 -0700] "GET /wp-login.php HTTP/1.1" 200 2988 "-" "Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0" 128.70.88.94 - - [19/Sep/2015:03:58:09 -0700] "POST /wp-login.php HTTP/1.1" 302 - "https://site.com/wp-login.php" "Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0" 128.70.88.94 - - [19/Sep/2015:03:58:09 -0700] "POST /wp-login.php HTTP/1.1" 302 - "https://site.com/wp-login.php" "Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0"
The one that bypassed Wordfence:
79.105.24.139 - - [19/Sep/2015:04:06:01 -0700] "GET /wp-login.php HTTP/1.1" 200 2988 "-" "Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0" 79.105.24.139 - - [19/Sep/2015:04:06:13 -0700] "POST /wp-login.php HTTP/1.1" 200 3870 "https://site.com/wp-login.php" "Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0"
I’m sorry that lately I’m sending too many tickets, but know that my intention is to help you too.
Viewing 8 replies - 1 through 8 (of 8 total)
Viewing 8 replies - 1 through 8 (of 8 total)
- The topic ‘Login attempt bypass Wordfence’ is closed to new replies.