Screenshot of error – https://share.nmblc.cloud/f029c714
]]>“Important: Some Solid Security features are disabled because IP Detection has not been configured.?Configure Now”
I have to manually go in and select ‘Security Check Scan’ under ‘IP Detection’ or else go back into Features and recheck ‘Security Check Pro’. A lot of times, I find that ‘File Change’ has also been selected when previously it was toggled off.
With many hundreds of sites, this is getting pretty tedious each time when I am performing updates. Will this be fixed?
]]>
PS: I am 99.9999% sure it is someone from outside doing this, I’ve blocked them before when I could see their IPs but for some reason I cant see their IPs now, showing server IP instead
]]>Global Options > “How does Wordfence get IPs?” all options show my matching correct public IP.
Tools>Diagnotics shows my IP with a checkmark.
Why am I still getting this error?
Only recent change made was site was put on new Google platform at Siteground and we had to update domain settings at GoDaddy, but I don’t see how that would be related.
Thanks.
]]>Over the past few days, I’ve gotten an increasing number of “User locked out from signing in” messages, all with the same IP address. But when I went to block it, I realized that WordFence identified it as my IP address. It’s not my IP address. I tried accessing from another IP address, and again, WordFence recorded it as the same incorrect IP address. (In case it is helpful, the IP address WordFence is consistently identifying is 173.236.11.190.)
I tried changing the IP detection method, but no option yields any other result. Every time, it identifies my IP address as the 173 one.
WordFence says it blocked over 25,000 brute-force attacks today, all from this same IP. I don’t know whether this was a real attack, or whether it’s a glitch in the plugin. Stopped seeing new login attempts after I changed the IP detection method a couple times, but it’s now right back where it started (REMOTE_ADDR). Don’t know if the cessation of activity was related, or a coincidence.
Final (possibly relevant) bit of information: While WordFence was misidentifying my IP as of yesterday, it wasn’t until today that I got an error message from it that was unable to accurately detect IPs. After I switched IP detection methods around, the alert disappeared . . . despite the fact that the detection method is right back where it started.
I’ve perused the forums and help pages, but haven’t been able to find anything that’s helped in this particular situation. I’d appreciate any advice you can offer.
Thanks in advance for your time and help!
]]>Here is our current code that is working – and my new code that doesn’t show:
https://prntscr.com/qg4sc7
This is to show that the one code is working:
https://prntscr.com/qg4spj
here is our data source selection:
https://prntscr.com/qg4tbr
Any help as to why the Canada code isn’t working would be most helpful – thank you
]]>I followed the advice in Wordfence documentation to enable the Wordfence Assistant and then disable the firewall and reactivate Wordfence. Once I had Wordfence reactivated I took a look at my live traffic logs, and I believe I’ve found the cause of the trouble but I’m not sure the best way to resolve it. I currently use the free version of Cloudflare CDN, and all traffic to my site is being routed through Cloudflare including my own. When I run “whois” on the live traffic hits, they all return “Cloudflare” as the NetName and OrgName.
The problem with this is that, for some time now, I have been experiencing a large number of brute force attacks using invalid usernames. I have Wordfence set up to block all such attempts as at the moment there are no other users. Because all IP address are appearing to come from the same place (Cloudflare), my own as well as the hacker’s, I was blocked from my site. I could even see on the live traffic list where a hacker was routed on the same exact IP address as me.
Currently Wordfence is set to the default “Let Wordfence use the most secure method to get visitor IP addresses. Prevents spoofing and works with most sites.” Which obviously is not the right setup for my site. I think that using “X-Forwarded-For HTTP header” or “X-Real-IP HTTP header” would be better, but I don’t know which one I should use or if it even makes a difference. In addition to the Cloudflare free CDN, my hosting provider uses Varnish reverse proxy cache, if that makes a difference here.
]]>If you click the red ‘BUY’ button on that page, a pop-up displays with the choice of outlets in the location near wherever you are located globally.
We want visitors to our website to be presented with the reseller/distributor for our products near to them.
Thanks, Shaun.
]]>