Since blocking xmlrpc.php in my .htaccess file I have identified two web hosting providers as being the main sources for these probing attacks. They are Ecatel Ltd. in the Netherlands and Hetzner Online AG in Germany. Discussions on forums indicate these services do not properly investigate abuse complaints and may possibly be friendly to hackers and spammers.
If you know how to update your firewalls or block IP address ranges in your .htaccess files you can get their IP info here:
Hetzner Online AG
https://bgp.he.net/AS24940#_prefixes
Ecatel Ltd.
https://bgp.he.net/AS29073#_prefixes
You may not have to block everything. Just disable access to the xmlrpc.php script with this code in .htaccess (only know how to do this for Apache — sorry):
<Files “xmlrpc.php”>
Order Allow,Deny
deny from all
</Files>
Then wait a few hours or a day. Then look at your Apache error log file. Filter for xmlrpc.php. You should see the IP addresses coming out of Ecatel and Hetzner so you can identify the right blocks to deny access to.
Legitimate browser traffic does not come from Web hosting services excpet for the rare proxy script and most of those won’t be looking for ways to exploit WordPress.
Also you may want to allow your own Website’s IP address for the xmlrpc.php fule as i think Worpress occasionally checks it.