Brute force attack on xmlrpc.php not blocked
-
I noticed high load on my server and traced it to a single IP posting to xmlrpc.php every second. I have manually blocked the IP at the firewall.
According to this article and this support topic, Wordfence should be blocking these requests. I looked for anything in settings to do with xmlrpc and the only one I found was to do with requiring 2FA for authentication.
Have I missed a setting, or have I misunderstood how Wordfence deals with repeated attempts to access site via xml-rpc? I use fail2ban and can create a filter, but would rather Wordfence deal with this if possible.
Thanks
Viewing 3 replies - 1 through 3 (of 3 total)
Viewing 3 replies - 1 through 3 (of 3 total)
- The topic ‘Brute force attack on xmlrpc.php not blocked’ is closed to new replies.