ERROR 500 – INTERNAL SERVER ERROR after upgrade to version 5.6.0
-
Hi I just upgraded to itheme security to the latest version. Now my whole site is broken.
Please help me to fix it.
Thank you
here is the log file:
[Wed Jul 27 16:29:06 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid., referer: https://www.test123.com/ [Wed Jul 27 16:29:02 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid. [Wed Jul 27 16:28:06 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid. [Wed Jul 27 16:27:44 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid., referer: https://www.test123.com/ [Wed Jul 27 16:27:41 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid. [Wed Jul 27 16:27:40 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid., referer: https://www.test123.com/ [Wed Jul 27 16:27:38 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid. [Wed Jul 27 16:26:08 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid. [Wed Jul 27 16:25:44 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid. [Wed Jul 27 16:23:43 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid. [Wed Jul 27 16:23:26 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid. [Wed Jul 27 16:23:21 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid. [Wed Jul 27 16:23:16 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid. [Wed Jul 27 16:23:12 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid. [Wed Jul 27 16:23:12 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid. [Wed Jul 27 16:23:11 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid. [Wed Jul 27 16:23:09 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid., referer: https://www.test123.com/wp-admin/admin.php?page=itsec&module_type=recommended [Wed Jul 27 16:23:07 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid., referer: https://www.test123.com/wp-admin/admin.php?page=itsec&module_type=recommended [Wed Jul 27 16:23:06 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid. [Wed Jul 27 16:23:03 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid., referer: https://www.test123.com/wp-admin/admin.php?page=itsec&module_type=recommended [Wed Jul 27 16:22:45 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid., referer: https://www.test123.com/wp-admin/admin.php?page=itsec&module_type=recommended [Wed Jul 27 16:22:37 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid., referer: https://www.test123.com/wp-admin/admin.php?page=itsec&module_type=recommended [Wed Jul 27 16:22:35 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid., referer: https://www.test123.com/wp-admin/admin.php?page=itsec&module_type=recommended [Wed Jul 27 16:21:45 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid., referer: https://www.test123.com/wp-admin/admin.php?page=itsec&module=security-check&module_type=recommended [Wed Jul 27 16:20:45 2016] [alert] [client xx.xxx.xxx.x] /home/test123/public_html/.htaccess: The specified IP address is invalid., referer: https://www.test123.com/wp-admin/admin.php?page=itsec&module=security-check&module_type=recommended php error_log [24-Jul-2016 01:03:53 UTC] PHP Fatal error: Maximum execution time of 30 seconds exceeded in /home/test123/public_html/wp-content/plugins/better-wp-security/core/class-itsec-lib.php on line 238
-
Please post the content of the /home/test123/public_html/.htaccess file.
What web server and what version of that web server is the website using ?
(eg. Apache 2.2.12)dwinden
@dwinden thank you for the reply.
I hosted my website in hostgator.
Apache: 2.2.31
MySQL: 5.5.48-37.8
PHP: 5.4.45.htaccess file
# BEGIN iThemes Security - Do not modify or remove this line # iThemes Security Config Details: 2 # Enable HackRepair.com's blacklist feature - Security > Settings > Banned Users > Default Blacklist # Start HackRepair.com Blacklist RewriteEngine on # Start Abuse Agent Blocking RewriteCond %{HTTP_USER_AGENT} "^Mozilla.*Indy" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Mozilla.*NEWT" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^$" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Maxthon$" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^SeaMonkey$" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Acunetix" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^binlar" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^BlackWidow" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Bolt 0" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^BOT for JCE" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Bot mailto\:craftbot@yahoo\.com" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^casper" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^checkprivacy" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^ChinaClaw" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^clshttp" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^cmsworldmap" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^comodo" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Custo" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Default Browser 0" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^diavol" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^DIIbot" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^DISCo" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^dotbot" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Download Demon" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^eCatch" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^EirGrabber" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^EmailCollector" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^EmailSiphon" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^EmailWolf" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Express WebPictures" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^extract" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^ExtractorPro" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^EyeNetIE" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^feedfinder" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^FHscan" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^FlashGet" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^flicky" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^g00g1e" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^GetRight" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^GetWeb\!" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Go\!Zilla" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Go\-Ahead\-Got\-It" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^grab" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^GrabNet" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Grafula" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^harvest" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^HMView" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^ia_archiver" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Image Stripper" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Image Sucker" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^InterGET" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Internet Ninja" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^InternetSeer\.com" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^jakarta" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Java" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^JetCar" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^JOC Web Spider" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^kanagawa" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^kmccrew" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^larbin" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^LeechFTP" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^libwww" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Mass Downloader" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^microsoft\.url" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^MIDown tool" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^miner" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Mister PiX" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^MSFrontPage" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Navroad" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^NearSite" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Net Vampire" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^NetAnts" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^NetSpider" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^NetZIP" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^nutch" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Octopus" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Offline Explorer" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Offline Navigator" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^PageGrabber" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Papa Foto" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^pavuk" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^pcBrowser" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^PeoplePal" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^planetwork" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^psbot" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^purebot" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^pycurl" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^RealDownload" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^ReGet" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Rippers 0" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^sitecheck\.internetseer\.com" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^SiteSnagger" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^skygrid" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^SmartDownload" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^sucker" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^SuperBot" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^SuperHTTP" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Surfbot" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^tAkeOut" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Teleport Pro" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Toata dragostea mea pentru diavola" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^turnit" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^vikspider" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^VoidEYE" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Web Image Collector" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Web Sucker" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^WebAuto" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^WebBandit" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^WebCopier" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^WebFetch" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^WebGo IS" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^WebLeacher" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^WebReaper" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^WebSauger" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Website eXtractor" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Website Quester" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^WebStripper" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^WebWhacker" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^WebZIP" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Wget" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Widow" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^WPScan" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^WWW\-Mechanize" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^WWWOFFLE" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Xaldon WebSpider" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^Zeus" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "^zmeu" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "360Spider" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "AhrefsBot" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "CazoodleBot" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "discobot" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "EasouSpider" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "ecxi" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "GT\:\:WWW" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "heritrix" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "HTTP\:\:Lite" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "HTTrack" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "ia_archiver" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "id\-search" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "IDBot" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "Indy Library" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "IRLbot" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "ISC Systems iRc Search 2\.1" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "LinksCrawler" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "LinksManager\.com_bot" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "linkwalker" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "lwp\-trivial" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "MFC_Tear_Sample" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "Microsoft URL Control" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "Missigua Locator" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "MJ12bot" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "panscient\.com" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "PECL\:\:HTTP" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "PHPCrawl" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "PleaseCrawl" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "SBIder" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "SearchmetricsBot" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "SeznamBot" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "Snoopy" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "Steeler" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "URI\:\:Fetch" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "urllib" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "Web Sucker" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "webalta" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "WebCollage" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "Wells Search II" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "WEP Search" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "XoviBot" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "YisouSpider" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "zermelo" [NC,OR] RewriteCond %{HTTP_USER_AGENT} "ZyBorg" [NC,OR] # End Abuse Agent Blocking # Start Abuse HTTP Referrer Blocking RewriteCond %{HTTP_REFERER} "^https?://(?:[^/]+\.)?semalt\.com" [NC,OR] RewriteCond %{HTTP_REFERER} "^https?://(?:[^/]+\.)?kambasoft\.com" [NC,OR] RewriteCond %{HTTP_REFERER} "^https?://(?:[^/]+\.)?savetubevideo\.com" [NC] # End Abuse HTTP Referrer Blocking RewriteRule ^.* - [F,L] # End HackRepair.com Blacklist, https://pastebin.com/u/hackrepair # Ban Hosts - Security > Settings > Banned Users SetEnvIF REMOTE_ADDR "^213\.60\.51\.127$" DenyAccess SetEnvIF X-FORWARDED-FOR "^213\.60\.51\.127$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^213\.60\.51\.127$" DenyAccess SetEnvIF REMOTE_ADDR "^27\.255\.84\.219$" DenyAccess SetEnvIF X-FORWARDED-FOR "^27\.255\.84\.219$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^27\.255\.84\.219$" DenyAccess SetEnvIF REMOTE_ADDR "^2a00:1210:fffe:0?0?72:(0{0,4}:){0,2}(0{0,4})?:0?0?0?1$" DenyAccess SetEnvIF X-FORWARDED-FOR "^2a00:1210:fffe:0?0?72:(0{0,4}:){0,2}(0{0,4})?:0?0?0?1$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^2a00:1210:fffe:0?0?72:(0{0,4}:){0,2}(0{0,4})?:0?0?0?1$" DenyAccess SetEnvIF REMOTE_ADDR "^78\.188\.14\.220$" DenyAccess SetEnvIF X-FORWARDED-FOR "^78\.188\.14\.220$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^78\.188\.14\.220$" DenyAccess SetEnvIF REMOTE_ADDR "^90\.83\.206\.193$" DenyAccess SetEnvIF X-FORWARDED-FOR "^90\.83\.206\.193$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^90\.83\.206\.193$" DenyAccess SetEnvIF REMOTE_ADDR "^95\.241\.106\.161$" DenyAccess SetEnvIF X-FORWARDED-FOR "^95\.241\.106\.161$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^95\.241\.106\.161$" DenyAccess SetEnvIF REMOTE_ADDR "^190\.221\.80\.137$" DenyAccess SetEnvIF X-FORWARDED-FOR "^190\.221\.80\.137$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^190\.221\.80\.137$" DenyAccess SetEnvIF REMOTE_ADDR "^78\.85\.73\.149$" DenyAccess SetEnvIF X-FORWARDED-FOR "^78\.85\.73\.149$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^78\.85\.73\.149$" DenyAccess SetEnvIF REMOTE_ADDR "^194\.187\.228\.10$" DenyAccess SetEnvIF X-FORWARDED-FOR "^194\.187\.228\.10$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^194\.187\.228\.10$" DenyAccess SetEnvIF REMOTE_ADDR "^77\.51\.94\.161$" DenyAccess SetEnvIF X-FORWARDED-FOR "^77\.51\.94\.161$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^77\.51\.94\.161$" DenyAccess SetEnvIF REMOTE_ADDR "^178\.49\.76\.74$" DenyAccess SetEnvIF X-FORWARDED-FOR "^178\.49\.76\.74$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^178\.49\.76\.74$" DenyAccess SetEnvIF REMOTE_ADDR "^194\.48\.218\.139$" DenyAccess SetEnvIF X-FORWARDED-FOR "^194\.48\.218\.139$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^194\.48\.218\.139$" DenyAccess SetEnvIF REMOTE_ADDR "^37\.204\.243\.201$" DenyAccess SetEnvIF X-FORWARDED-FOR "^37\.204\.243\.201$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^37\.204\.243\.201$" DenyAccess SetEnvIF REMOTE_ADDR "^178\.212\.225\.15$" DenyAccess SetEnvIF X-FORWARDED-FOR "^178\.212\.225\.15$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^178\.212\.225\.15$" DenyAccess SetEnvIF REMOTE_ADDR "^188\.0\.185\.178$" DenyAccess SetEnvIF X-FORWARDED-FOR "^188\.0\.185\.178$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^188\.0\.185\.178$" DenyAccess SetEnvIF REMOTE_ADDR "^83\.139\.146\.80$" DenyAccess SetEnvIF X-FORWARDED-FOR "^83\.139\.146\.80$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^83\.139\.146\.80$" DenyAccess SetEnvIF REMOTE_ADDR "^149\.3\.47\.99$" DenyAccess SetEnvIF X-FORWARDED-FOR "^149\.3\.47\.99$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^149\.3\.47\.99$" DenyAccess SetEnvIF REMOTE_ADDR "^194\.28\.75\.138$" DenyAccess SetEnvIF X-FORWARDED-FOR "^194\.28\.75\.138$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^194\.28\.75\.138$" DenyAccess SetEnvIF REMOTE_ADDR "^37\.115\.133\.36$" DenyAccess SetEnvIF X-FORWARDED-FOR "^37\.115\.133\.36$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^37\.115\.133\.36$" DenyAccess SetEnvIF REMOTE_ADDR "^37\.115\.92\.241$" DenyAccess SetEnvIF X-FORWARDED-FOR "^37\.115\.92\.241$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^37\.115\.92\.241$" DenyAccess SetEnvIF REMOTE_ADDR "^208\.89\.129\.203$" DenyAccess SetEnvIF X-FORWARDED-FOR "^208\.89\.129\.203$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^208\.89\.129\.203$" DenyAccess SetEnvIF REMOTE_ADDR "^46\.46\.160\.158$" DenyAccess SetEnvIF X-FORWARDED-FOR "^46\.46\.160\.158$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^46\.46\.160\.158$" DenyAccess SetEnvIF REMOTE_ADDR "^185\.30\.27\.164$" DenyAccess SetEnvIF X-FORWARDED-FOR "^185\.30\.27\.164$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^185\.30\.27\.164$" DenyAccess SetEnvIF REMOTE_ADDR "^207\.35\.85\.163$" DenyAccess SetEnvIF X-FORWARDED-FOR "^207\.35\.85\.163$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^207\.35\.85\.163$" DenyAccess SetEnvIF REMOTE_ADDR "^104\.137\.244\.83$" DenyAccess SetEnvIF X-FORWARDED-FOR "^104\.137\.244\.83$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^104\.137\.244\.83$" DenyAccess SetEnvIF REMOTE_ADDR "^193\.201\.224\.8$" DenyAccess SetEnvIF X-FORWARDED-FOR "^193\.201\.224\.8$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^193\.201\.224\.8$" DenyAccess SetEnvIF REMOTE_ADDR "^82\.130\.196\.122$" DenyAccess SetEnvIF X-FORWARDED-FOR "^82\.130\.196\.122$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^82\.130\.196\.122$" DenyAccess SetEnvIF REMOTE_ADDR "^217\.66\.106\.211$" DenyAccess SetEnvIF X-FORWARDED-FOR "^217\.66\.106\.211$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^217\.66\.106\.211$" DenyAccess SetEnvIF REMOTE_ADDR "^212\.130\.141\.52$" DenyAccess SetEnvIF X-FORWARDED-FOR "^212\.130\.141\.52$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^212\.130\.141\.52$" DenyAccess SetEnvIF REMOTE_ADDR "^5\.57\.151\.106$" DenyAccess SetEnvIF X-FORWARDED-FOR "^5\.57\.151\.106$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^5\.57\.151\.106$" DenyAccess SetEnvIF REMOTE_ADDR "^37\.115\.73\.149$" DenyAccess SetEnvIF X-FORWARDED-FOR "^37\.115\.73\.149$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^37\.115\.73\.149$" DenyAccess SetEnvIF REMOTE_ADDR "^46\.211\.20\.49$" DenyAccess SetEnvIF X-FORWARDED-FOR "^46\.211\.20\.49$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^46\.211\.20\.49$" DenyAccess SetEnvIF REMOTE_ADDR "^92\.63\.87\.97$" DenyAccess SetEnvIF X-FORWARDED-FOR "^92\.63\.87\.97$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^92\.63\.87\.97$" DenyAccess SetEnvIF REMOTE_ADDR "^84\.240\.9\.6$" DenyAccess SetEnvIF X-FORWARDED-FOR "^84\.240\.9\.6$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^84\.240\.9\.6$" DenyAccess SetEnvIF REMOTE_ADDR "^46\.148\.22\.18$" DenyAccess SetEnvIF X-FORWARDED-FOR "^46\.148\.22\.18$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^46\.148\.22\.18$" DenyAccess SetEnvIF REMOTE_ADDR "^185\.92\.72\.33$" DenyAccess SetEnvIF X-FORWARDED-FOR "^185\.92\.72\.33$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^185\.92\.72\.33$" DenyAccess SetEnvIF REMOTE_ADDR "^87\.213\.73\.178$" DenyAccess SetEnvIF X-FORWARDED-FOR "^87\.213\.73\.178$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^87\.213\.73\.178$" DenyAccess SetEnvIF REMOTE_ADDR "^46\.148\.18\.162$" DenyAccess SetEnvIF X-FORWARDED-FOR "^46\.148\.18\.162$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^46\.148\.18\.162$" DenyAccess SetEnvIF REMOTE_ADDR "^46\.119\.58\.184$" DenyAccess SetEnvIF X-FORWARDED-FOR "^46\.119\.58\.184$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^46\.119\.58\.184$" DenyAccess SetEnvIF REMOTE_ADDR "^75\.127\.143\.234$" DenyAccess SetEnvIF X-FORWARDED-FOR "^75\.127\.143\.234$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^75\.127\.143\.234$" DenyAccess SetEnvIF REMOTE_ADDR "^91\.200\.12\.53$" DenyAccess SetEnvIF X-FORWARDED-FOR "^91\.200\.12\.53$" DenyAccess SetEnvIF X-CLUSTER-CLIENT-IP "^91\.200\.12\.53$" DenyAccess <IfModule mod_authz_core.c> <RequireAll> Require all granted Require not env DenyAccess Require not ip 213.60.51.127 Require not ip 27.255.84.219 Require not ip 2a00:1210:fffe:72::1 Require not ip 78.188.14.220 Require not ip 90.83.206.193 Require not ip 95.241.106.161 Require not ip 190.221.80.137 Require not ip 78.85.73.149 Require not ip 194.187.228.10 Require not ip 77.51.94.161 Require not ip 178.49.76.74 Require not ip 194.48.218.139 Require not ip 37.204.243.201 Require not ip 178.212.225.15 Require not ip 188.0.185.178 Require not ip 83.139.146.80 Require not ip 149.3.47.99 Require not ip 194.28.75.138 Require not ip 37.115.133.36 Require not ip 37.115.92.241 Require not ip 208.89.129.203 Require not ip 46.46.160.158 Require not ip 185.30.27.164 Require not ip 207.35.85.163 Require not ip 104.137.244.83 Require not ip 193.201.224.8 Require not ip 82.130.196.122 Require not ip 217.66.106.211 Require not ip 212.130.141.52 Require not ip 5.57.151.106 Require not ip 37.115.73.149 Require not ip 46.211.20.49 Require not ip 92.63.87.97 Require not ip 84.240.9.6 Require not ip 46.148.22.18 Require not ip 185.92.72.33 Require not ip 87.213.73.178 Require not ip 46.148.18.162 Require not ip 46.119.58.184 Require not ip 75.127.143.234 Require not ip 91.200.12.53 </RequireAll> </IfModule> <IfModule !mod_authz_core.c> Order allow,deny Allow from all Deny from env=DenyAccess Deny from 213.60.51.127 Deny from 27.255.84.219 Deny from 2a00:1210:fffe:72::1 Deny from 78.188.14.220 Deny from 90.83.206.193 Deny from 95.241.106.161 Deny from 190.221.80.137 Deny from 78.85.73.149 Deny from 194.187.228.10 Deny from 77.51.94.161 Deny from 178.49.76.74 Deny from 194.48.218.139 Deny from 37.204.243.201 Deny from 178.212.225.15 Deny from 188.0.185.178 Deny from 83.139.146.80 Deny from 149.3.47.99 Deny from 194.28.75.138 Deny from 37.115.133.36 Deny from 37.115.92.241 Deny from 208.89.129.203 Deny from 46.46.160.158 Deny from 185.30.27.164 Deny from 207.35.85.163 Deny from 104.137.244.83 Deny from 193.201.224.8 Deny from 82.130.196.122 Deny from 217.66.106.211 Deny from 212.130.141.52 Deny from 5.57.151.106 Deny from 37.115.73.149 Deny from 46.211.20.49 Deny from 92.63.87.97 Deny from 84.240.9.6 Deny from 46.148.22.18 Deny from 185.92.72.33 Deny from 87.213.73.178 Deny from 46.148.18.162 Deny from 46.119.58.184 Deny from 75.127.143.234 Deny from 91.200.12.53 </IfModule> <IfModule mod_rewrite.c> RewriteEngine On # Reduce Comment Spam - Security > Settings > WordPress Tweaks > Comment Spam RewriteCond %{REQUEST_METHOD} POST RewriteCond %{REQUEST_URI} /wp-comments-post\.php$ RewriteCond %{HTTP_USER_AGENT} ^$ [OR] RewriteCond %{HTTP_REFERER} !^https?://(([^/]+\.)?test123\.com|jetpack\.wordpress\.com/jetpack-comment)(/|$) [NC] RewriteRule ^.* - [F] </IfModule> # Protect System Files - Security > Settings > System Tweaks > System Files <files .htaccess> <IfModule mod_authz_core.c> Require all denied </IfModule> <IfModule !mod_authz_core.c> Order allow,deny Deny from all </IfModule> </files> <files readme.html> <IfModule mod_authz_core.c> Require all denied </IfModule> <IfModule !mod_authz_core.c> Order allow,deny Deny from all </IfModule> </files> <files readme.txt> <IfModule mod_authz_core.c> Require all denied </IfModule> <IfModule !mod_authz_core.c> Order allow,deny Deny from all </IfModule> </files> <files install.php> <IfModule mod_authz_core.c> Require all denied </IfModule> <IfModule !mod_authz_core.c> Order allow,deny Deny from all </IfModule> </files> <files wp-config.php> <IfModule mod_authz_core.c> Require all denied </IfModule> <IfModule !mod_authz_core.c> Order allow,deny Deny from all </IfModule> </files> # Disable Directory Browsing - Security > Settings > System Tweaks > Directory Browsing Options -Indexes <IfModule mod_rewrite.c> RewriteEngine On # Protect System Files - Security > Settings > System Tweaks > System Files RewriteRule ^wp-admin/includes/ - [F] RewriteRule !^wp-includes/ - [S=3] RewriteCond %{SCRIPT_FILENAME} !^(.*)wp-includes/ms-files.php RewriteRule ^wp-includes/[^/]+\.php$ - [F] RewriteRule ^wp-includes/js/tinymce/langs/.+\.php - [F] RewriteRule ^wp-includes/theme-compat/ - [F] # Disable PHP in Uploads - Security > Settings > System Tweaks > Uploads RewriteRule ^wp\-content/uploads/.*\.(?:php[1-6]?|pht|phtml?)$ - [NC,F] </IfModule> # END iThemes Security - Do not modify or remove this line # BEGIN W3TC Browser Cache <IfModule mod_mime.c> AddType text/css .css AddType text/x-component .htc AddType application/x-javascript .js AddType application/javascript .js2 AddType text/javascript .js3 AddType text/x-js .js4 AddType text/html .html .htm AddType text/richtext .rtf .rtx AddType image/svg+xml .svg .svgz AddType text/plain .txt AddType text/xsd .xsd AddType text/xsl .xsl AddType text/xml .xml AddType video/asf .asf .asx .wax .wmv .wmx AddType video/avi .avi AddType image/bmp .bmp AddType application/java .class AddType video/divx .divx AddType application/msword .doc .docx AddType application/vnd.ms-fontobject .eot AddType application/x-msdownload .exe AddType image/gif .gif AddType application/x-gzip .gz .gzip AddType image/x-icon .ico AddType image/jpeg .jpg .jpeg .jpe AddType application/json .json AddType application/vnd.ms-access .mdb AddType audio/midi .mid .midi AddType video/quicktime .mov .qt AddType audio/mpeg .mp3 .m4a AddType video/mp4 .mp4 .m4v AddType video/mpeg .mpeg .mpg .mpe AddType application/vnd.ms-project .mpp AddType application/x-font-otf .otf AddType application/vnd.ms-opentype .otf AddType application/vnd.oasis.opendocument.database .odb AddType application/vnd.oasis.opendocument.chart .odc AddType application/vnd.oasis.opendocument.formula .odf AddType application/vnd.oasis.opendocument.graphics .odg AddType application/vnd.oasis.opendocument.presentation .odp AddType application/vnd.oasis.opendocument.spreadsheet .ods AddType application/vnd.oasis.opendocument.text .odt AddType audio/ogg .ogg AddType application/pdf .pdf AddType image/png .png AddType application/vnd.ms-powerpoint .pot .pps .ppt .pptx AddType audio/x-realaudio .ra .ram AddType application/x-shockwave-flash .swf AddType application/x-tar .tar AddType image/tiff .tif .tiff AddType application/x-font-ttf .ttf .ttc AddType application/vnd.ms-opentype .ttf .ttc AddType audio/wav .wav AddType audio/wma .wma AddType application/vnd.ms-write .wri AddType application/font-woff .woff AddType application/vnd.ms-excel .xla .xls .xlsx .xlt .xlw AddType application/zip .zip </IfModule> <IfModule mod_expires.c> ExpiresActive On ExpiresByType text/css A31536000 ExpiresByType text/x-component A31536000 ExpiresByType application/x-javascript A31536000 ExpiresByType application/javascript A31536000 ExpiresByType text/javascript A31536000 ExpiresByType text/x-js A31536000 ExpiresByType text/html A7200 ExpiresByType text/richtext A7200 ExpiresByType image/svg+xml A7200 ExpiresByType text/plain A7200 ExpiresByType text/xsd A7200 ExpiresByType text/xsl A7200 ExpiresByType text/xml A7200 ExpiresByType video/asf A31536000 ExpiresByType video/avi A31536000 ExpiresByType image/bmp A31536000 ExpiresByType application/java A31536000 ExpiresByType video/divx A31536000 ExpiresByType application/msword A31536000 ExpiresByType application/vnd.ms-fontobject A31536000 ExpiresByType application/x-msdownload A31536000 ExpiresByType image/gif A31536000 ExpiresByType application/x-gzip A31536000 ExpiresByType image/x-icon A31536000 ExpiresByType image/jpeg A31536000 ExpiresByType application/json A31536000 ExpiresByType application/vnd.ms-access A31536000 ExpiresByType audio/midi A31536000 ExpiresByType video/quicktime A31536000 ExpiresByType audio/mpeg A31536000 ExpiresByType video/mp4 A31536000 ExpiresByType video/mpeg A31536000 ExpiresByType application/vnd.ms-project A31536000 ExpiresByType application/x-font-otf A31536000 ExpiresByType application/vnd.ms-opentype A31536000 ExpiresByType application/vnd.oasis.opendocument.database A31536000 ExpiresByType application/vnd.oasis.opendocument.chart A31536000 ExpiresByType application/vnd.oasis.opendocument.formula A31536000 ExpiresByType application/vnd.oasis.opendocument.graphics A31536000 ExpiresByType application/vnd.oasis.opendocument.presentation A31536000 ExpiresByType application/vnd.oasis.opendocument.spreadsheet A31536000 ExpiresByType application/vnd.oasis.opendocument.text A31536000 ExpiresByType audio/ogg A31536000 ExpiresByType application/pdf A31536000 ExpiresByType image/png A31536000 ExpiresByType application/vnd.ms-powerpoint A31536000 ExpiresByType audio/x-realaudio A31536000 ExpiresByType image/svg+xml A31536000 ExpiresByType application/x-shockwave-flash A31536000 ExpiresByType application/x-tar A31536000 ExpiresByType image/tiff A31536000 ExpiresByType application/x-font-ttf A31536000 ExpiresByType application/vnd.ms-opentype A31536000 ExpiresByType audio/wav A31536000 ExpiresByType audio/wma A31536000 ExpiresByType application/vnd.ms-write A31536000 ExpiresByType application/font-woff A31536000 ExpiresByType application/vnd.ms-excel A31536000 ExpiresByType application/zip A31536000 </IfModule> <IfModule mod_deflate.c> <IfModule mod_headers.c> Header append Vary User-Agent env=!dont-vary </IfModule> AddOutputFilterByType DEFLATE text/css text/x-component application/x-javascript application/javascript text/javascript text/x-js text/html text/richtext image/svg+xml text/plain text/xsd text/xsl text/xml image/x-icon application/json <IfModule mod_mime.c> # DEFLATE by extension AddOutputFilter DEFLATE js css htm html xml </IfModule> </IfModule> <FilesMatch "\.(css|htc|less|js|js2|js3|js4|CSS|HTC|LESS|JS|JS2|JS3|JS4)$"> FileETag MTime Size <IfModule mod_headers.c> Header set Pragma "public" Header append Cache-Control "public, must-revalidate, proxy-revalidate" Header set X-Powered-By "W3 Total Cache/0.9.4.1" </IfModule> </FilesMatch> <FilesMatch "\.(html|htm|rtf|rtx|svg|svgz|txt|xsd|xsl|xml|HTML|HTM|RTF|RTX|SVG|SVGZ|TXT|XSD|XSL|XML)$"> FileETag MTime Size <IfModule mod_headers.c> Header set Pragma "public" Header append Cache-Control "public, must-revalidate, proxy-revalidate" Header set X-Powered-By "W3 Total Cache/0.9.4.1" </IfModule> </FilesMatch> <FilesMatch "\.(asf|asx|wax|wmv|wmx|avi|bmp|class|divx|doc|docx|eot|exe|gif|gz|gzip|ico|jpg|jpeg|jpe|json|mdb|mid|midi|mov|qt|mp3|m4a|mp4|m4v|mpeg|mpg|mpe|mpp|otf|odb|odc|odf|odg|odp|ods|odt|ogg|pdf|png|pot|pps|ppt|pptx|ra|ram|svg|svgz|swf|tar|tif|tiff|ttf|ttc|wav|wma|wri|woff|xla|xls|xlsx|xlt|xlw|zip|ASF|ASX|WAX|WMV|WMX|AVI|BMP|CLASS|DIVX|DOC|DOCX|EOT|EXE|GIF|GZ|GZIP|ICO|JPG|JPEG|JPE|JSON|MDB|MID|MIDI|MOV|QT|MP3|M4A|MP4|M4V|MPEG|MPG|MPE|MPP|OTF|ODB|ODC|ODF|ODG|ODP|ODS|ODT|OGG|PDF|PNG|POT|PPS|PPT|PPTX|RA|RAM|SVG|SVGZ|SWF|TAR|TIF|TIFF|TTF|TTC|WAV|WMA|WRI|WOFF|XLA|XLS|XLSX|XLT|XLW|ZIP)$"> FileETag MTime Size <IfModule mod_headers.c> Header set Pragma "public" Header append Cache-Control "public, must-revalidate, proxy-revalidate" Header set X-Powered-By "W3 Total Cache/0.9.4.1" </IfModule> </FilesMatch> # END W3TC Browser Cache # BEGIN W3TC Page Cache core <IfModule mod_rewrite.c> RewriteEngine On RewriteBase / RewriteCond %{HTTP:Accept-Encoding} gzip RewriteRule .* - [E=W3TC_ENC:_gzip] RewriteCond %{HTTP_COOKIE} w3tc_preview [NC] RewriteRule .* - [E=W3TC_PREVIEW:_preview] RewriteCond %{REQUEST_METHOD} !=POST RewriteCond %{QUERY_STRING} ="" RewriteCond %{REQUEST_URI} \/$ RewriteCond %{HTTP_COOKIE} !(comment_author|wp\-postpass|w3tc_logged_out|wordpress_logged_in|wptouch_switch_toggle) [NC] RewriteCond "%{DOCUMENT_ROOT}/wp-content/cache/page_enhanced/%{HTTP_HOST}/%{REQUEST_URI}/_index%{ENV:W3TC_PREVIEW}.html%{ENV:W3TC_ENC}" -f RewriteRule .* "/wp-content/cache/page_enhanced/%{HTTP_HOST}/%{REQUEST_URI}/_index%{ENV:W3TC_PREVIEW}.html%{ENV:W3TC_ENC}" [L] </IfModule> # END W3TC Page Cache core # BEGIN WordPress <IfModule mod_rewrite.c> RewriteEngine On RewriteBase / RewriteRule ^index\.php$ - [L] RewriteCond %{REQUEST_FILENAME} !-f RewriteCond %{REQUEST_FILENAME} !-d RewriteRule . /index.php [L] </IfModule> # END WordPress
Ask your hosting provider to increase the value of the php max_execution_time setting.
If that does not help try and disable File Change Detection.
dwinden
@dwinden thank you very much for the reply. Actually max execution error happened in 24th July. But site worked fine until 27th July. I upgrade the plugin 24th July but I didn’t go to the settings page until 27 July. Once I visited the setting page it served me a wizard type pop up and I just pressed SCAN button. So after the scan site stopped working and 500 error started come. I checked the .htaccess file. No errors are there.
Now I can’t access the admin page of the site. It shows 500 error as well. I just renamed the plugin folder over ftp. But still no luck.
I don’t know why it happen.
Please help me to fix it. Thank you
Thank you for that explanation.
Try and manually remove the following 5 lines from the .htaccess file:
SetEnvIF REMOTE_ADDR “^2a00:1210:fffe:0?0?72:(0{0,4}:){0,2}(0{0,4})?:0?0?0?1$” DenyAccess
SetEnvIF X-FORWARDED-FOR “^2a00:1210:fffe:0?0?72:(0{0,4}:){0,2}(0{0,4})?:0?0?0?1$” DenyAccess
SetEnvIF X-CLUSTER-CLIENT-IP “^2a00:1210:fffe:0?0?72:(0{0,4}:){0,2}(0{0,4})?:0?0?0?1$” DenyAccessRequire not ip 2a00:1210:fffe:72::1
Deny from 2a00:1210:fffe:72::1
This is just to see whether this is the offending IP causing the 500 internal server error/The specified IP address is invalid log entry.
If this helps solve the 500 internal server error I’ll provide you with additional instructions to remove the IP from the database.
dwinden
@dwinden thank you very much for the reply. I just deleted that 5 lines from my .htaccss. Now my site is up and running again. I’m so glad of you. You saved my life.
can you please provide me additional instruction to remove remove the IP from the database.
thank you.
@dwinden I had iThemes Brute Force Network Protection enabled in previous version. But it is disabled and asked me to make a new free key.
Thank you.
To remove the IP from the database follow these instructions:
- Log into WordPress Dashboard as an administrator.
- Navigate to the Security->Settings menu option.
- Click on the Configure Settings button of the Banned Users module.
- Remove the offending IP from the Ban Hosts setting.
- And finally click on the Save Settings button.
Since the issue as reported in this topic seems to be solved please mark this topic as ‘resolved’.
Create a new topic for any other issue/question.
dwinden
@dwinden thank you very much for the excellent help. I removed the offending ip from the list. Now everything works fine.
cheers.
- The topic ‘ERROR 500 – INTERNAL SERVER ERROR after upgrade to version 5.6.0’ is closed to new replies.