CIDR notification = CIDR notation
True but I was looking at the bigger picture.
If attacks suddenly start coming in from a different range of ip’s you would again receive all those lockout emails and you would need to add a new ip range to the Ban Hosts blacklist. And this exercise may repeat endlessly …
So that’s why I recommended to enable the Security Digest setting.
(Which by the way seems to have a bug where 2 identical emails are send).
But let’s take this a bit further …
It would be even better if you determined how those brute force login attempts are being performed … From the login page or using xml-rpc etc
And then use the right module/setting in the plugin to prevent that from happening.
For example if these are failed login attempts from the login page enable the Hide Backend module. Good chance the login attempts as “admin” (basically any malicious login attempts) will stop hitting your site …
If it’s an automated brute force attack using xml-rpc disable XML-RPC in the WordPress Tweaks module. However if your site needs XML-RPC this is probably not an option.
So have a look at the Login Source field (click on View Details) of the Brute Force module entries in the plugin Logs page and find out how your site is being attacked.
Also why is your site under (brute force) attack ? Apparently it is considered low hanging fruit on the internet …
So what can you do to make your site less attractive to attackers (bots) …
For instance if usernames can easily be harvested from your site, you are considered as an easy brute force target. So prevent user enumeration on your site … Good chance attackers will no longer be interested in attacking your site and they’ll move on to lower hanging fruit on the internet …
Defending against attacks is great but preventing any attacks is even better ??