Please advise, what possibly could be wrong with Defender or its settings.
]]>My autoresponder reply from CF7 has been going into junk mail folders. So I got the autoresponders ip address and added it to our SFP. But i have found that the ip is also on the Barracuda blacklist.
Is there a way to aside another ip to CF7?
]]>As the title indicates I cannot load my website from the company network. I cannot load the back end or front end. It just times out. I can load it from my phone and from home and any other internet connection just not my company internet. This is a hindrance and go daddy has no solution, we looked at our firewall and also found no problems.
What could this be?
Thanks,
]]>The good people at WP-RSS helped me troubleshoot the problem – offering solutions and even creating a test-site for me to help determine the cause of the problem.
After many hours on the phone with my host provider, it turned out that the IP address in question belonged to a tier-2 node on the edge network.
So, in short the problem was not my WP site, or the WP-RSS plugin’s.
I am grateful for the patience and thoroughness of the tech team at WP-RSS. The plugin is awesome, but the people behind it are the real stars.
]]>The IP address is blocked due to the following reason:
“ET WEB_SERVER Possible CVE-2014-6271 Attempt in HTTP Version Number”
More information about the CVE-2014-6271 is available below:
https://blogs.akamai.com/2014/09/environment-bashing.html
The firewall rule in questions looks for a string ‘ () {‘ sent from your IP to the web server).
Can you please provide us with more information what script or software you are using which is sending such strings to the web server so we can investigate this matter further?
Also the blockage will expire automatically within the next couple of minutes.
Any idea why it would be doing this?
https://www.ads-software.com/plugins/all-in-one-wp-migration/
]]>I’ve tried renaming the plugin folder on the server, which has ‘broken’ the plugin and allowed me to login safely. However, re-activating the plugin, which I thought would create a clean installation, only causes the same problem to recur.
I’m guessing that it would be possible to delete the plugin, remove the folder via FTP and do a fresh install, but that will mean losing the blacklist, which would be annoying. Is there any way of retrieving the blacklisted IPs from the plugin’s folder via FTP, or by any other method, prior to doing a fresh install?
https://www.ads-software.com/plugins/ip-blacklist-cloud/
]]>page=wp-IPBLC-list
page. These duplicates exist in wp_IPBLC_blacklist
and have been automatically added by the plugin, not by me.
For example:
IP count(1)
31.210.86.3 47
50.63.86.220 67
149.202.53.68 56
When this happens, both the visits
and lastvisit
are zero. For example, running this query that lists all the duplicated IP addresses:
SELECT *
FROM wp_IPBLC_blacklist
WHERE IP in
( SELECT IP
FROM wp_IPBLC_blacklist
GROUP BY wp_IPBLC_blacklist.IP
HAVING count(1) > 1
)
ORDER BY IP, timestamp
shows this:
id, IP, timestamp, visits, lastvisit,
820, 149.202.53.68, 1447521826, 0, 0
821, 149.202.53.68, 1447521826, 0, 0
822, 149.202.53.68, 1447521827, 0, 0
823, 149.202.53.68, 1447521827, 0, 0
<snip 48 rows>
872, 149.202.53.68, 1447521860, 0, 0
873, 149.202.53.68, 1447521861, 0, 0
874, 149.202.53.68, 1447521861, 0, 0
875, 149.202.53.68, 1447521862, 0, 0
767, 31.210.86.3, 1447407871, 0, 0
768, 31.210.86.3, 1447407872, 0, 0
769, 31.210.86.3, 1447407873, 0, 0
770, 31.210.86.3, 1447407873, 0, 0
<snip 39 rows>
810, 31.210.86.3, 1447407899, 0, 0
811, 31.210.86.3, 1447407900, 0, 0
813, 31.210.86.3, 1447407901, 0, 0
812, 31.210.86.3, 1447407901, 0, 0
877, 50.63.86.220, 1447551362, 0, 0
878, 50.63.86.220, 1447551363, 0, 0
879, 50.63.86.220, 1447551364, 0, 0
880, 50.63.86.220, 1447551364, 0, 0
<snip 58 rows>
940, 50.63.86.220, 1447551403, 0, 0
941, 50.63.86.220, 1447551403, 0, 0
942, 50.63.86.220, 1447551404, 0, 0
943, 50.63.86.220, 1447551405, 0, 0
https://www.ads-software.com/plugins/ip-blacklist-cloud/
]]>wp_IPBLC_login_failed
being quite large for these hacking attempts that use system.multicall. It is growing at about 20MB per week.
These records use the full 65535 characters of the variables
field.
I have recently started trimming these records so that they are only 1024 bytes long like this:
UPDATE wp_IPBLC_login_failed
SET variables = CONCAT( left(variables,1017), " etc…" )
WHERE length(variables) > 1024
Is there any benefit to wp_IPBLC_login_failed.variables
being 65,535 bytes long? Would a shorter field be good enough?
https://www.ads-software.com/plugins/ip-blacklist-cloud/
]]>I have to go and manually blacklist some spammers sometimes that manage to register nonetheless. What I noticed is that sometimes the IP is already listed in the StopForumSpam database. Still, they manage to get through. What’s the reason?
example from today: https://www.stopforumspam.com/ipcheck/178.73.202.154
Tigr
https://www.ads-software.com/plugins/stop-spammer-registrations-plugin/
]]>https://www.ads-software.com/extend/plugins/threewp-activity-monitor/
]]>