Use MainWP Extensions for Jetpack Protect and Scan

Scan and fix multiple WordPress websites from a centralized dashboard, combining the power of Jetpack and MainWP.

This article is only for customers using MainWP alongside Jetpack. If you’re not using MainWP, please see our general documentation about Jetpack Scan.

Screenshot of the MainWP dashboard (a third-party plugin). It is connected to Jetpack Protect, and there are several websites listed with details about number of plugins, themes, last check date, and the Jetpack connection.

The Jetpack Protect Extension for MainWP

To use the Jetpack Protect Extension for MainWP, you must have the Jetpack Protect plugin installed on your websites which use MainWP.

  1. From your MainWP Dashboard, navigate to Extensions, and enable “Jetpack Protect”.
  2. Click Jetpack Protect under Extensions; it will show you a list of websites with the Jetpack Protect plugin installed.
  3. Click on a Vulnerability icon; it will take you to the vulnerability details and guide how to fix them.

Note that Jetpack Protect automatically scans your sites once per day. This means that after resolving vulnerability issues, it can take up to 24 hours before the extension reflects changes.

The Jetpack Scan Extension for MainWP

To use the Jetpack Scan Extension for MainWP, you must have the Jetpack plugin installed on your websites on MainWP.

  1. From your MainWP Dashboard, navigate to Extensions, and enable “Jetpack Scan”.
  2. Click Jetpack Scan under Extensions, navigate to Add App and follow the on-screen instructions.
  3. Once done, navigate to Overview to see a list of all Jetpack Scan-connected sites.
  4. The Threats screen shows the Vulnerabilities, related details, and how to fix them.

Manage your WordPress websites with MainWP, and ensure their security by leveraging the power of Jetpack Protect and Jetpack Scan.

Useful Links

Comments Off on Use MainWP Extensions for Jetpack Protect and Scan

Jetpack Firewall in the Jetpack Protect Plugin

Jetpack Firewall examines incoming traffic to your site and decides to allow or block it based on various rules. This adds an important layer of protection to your site, particularly when attackers actively exploit unpatched vulnerabilities. 

The Firewall Premium features require a connection to a WordPress.com account and a plan that has a Scan feature, like Jetpack Security, Jetpack Complete, or Jetpack Scan, to allow or block incoming traffic based on various rules.

Activate Jetpack Firewall

1. Install and activate the Jetpack Protect plugin. 

2. Once activated, you can select either a paid or a free plan.

The free plan allows manual rules only to be used, providing the ability to block or allow specific IP addresses from accessing your site. It also includes Brute Force Protection. The paid plan offers automatic firewall rules that identify and block harmful requests. 

3. After choosing a plan, you will be redirected to the Jetpack Protect page and see the first scan started:

Upon choosing the plan, Jetpack Protect will initiate the initial scan for your website.

4. To access Jetpack Firewall settings, you can click the Firewall tab inside the Protect settings page, or navigate to Jetpack → Protect.

The free plan allows for the use of Jetpack’s Brute Force Attack Prevention and manual rules. The Automatic rules option requires a paid plan.

With the free plan, automatic rules option is not accessible and only manual rules can be applied

Upgrading to a paid plan will enable the automatic rules:

With the paid plan, automatic rules are applied.

To add manual rules, use the toggle to turn on the feature. When enabled, an “Edit manual rules” button will be displayed on the right side. Click the button and a new modal will be displayed where manual rules can be edited. You can add IP addresses to your block / allow list by entering complete IP addresses, separated by commas. Adding IP ranges or IP addresses in CIDR notation is not currently supported. Once you’ve entered IP addresses into your block / allow list, click on Save Settings to save your block / allow list.

Edit manual rules by adding specific IP addresses to the allow or block list.

Privacy Information

The Jetpack firewall is deactivated by default. You can activate the feature by visiting the Jetpack Protect dashboard and clicking the toggle in the firewall tab.

Data Used
Site Owners / Users

This feature evaluates the incoming HTTP requests and blocks them if they’re considered malicious.

User data is used to authenticate some of our APIs. Installed themes and plugins and WordPress version are used to know which versions we should check against the WPScan API in the free version of the WAF.
Site Visitors

None.
Activity Tracked
Site Owners / Users

If the Share data with Jetpack checkbox is selected we track which rules caused a request to be blocked. We don’t track actual request data with this option.

Jetpack Firewall also tracks when settings in the Firewall settings are turned on or off.

If the Share data with Jetpack checkbox is selected we track the following data of requests that trigger a WAF block:
  • Information about the rule that triggered the blockRequest URIUser agentRefererContent typeGET params
If the Share detailed data with Jetpack checkbox is selected we also track the following data for requests that triggered the block alongside the previously mentioned data:
  • POST params
  • Header data
Site Visitors

None.
Data Synced (Read More)
Site Owners / Users

Information about users/admins, installed themes and plugins, and WordPress version.
Site Visitors

None.

For general features and FAQs, please see our Jetpack Security features.

Comments Off on Jetpack Firewall in the Jetpack Protect Plugin

Jetpack Protect

Stay ahead of security threats and malware, keeping your site safe with Jetpack Protect. Scan your site and get warned about vulnerabilities.

Protect your reputation and revenue by avoiding a hacked website.

Requirements for Jetpack Protect

  • A web host that meets the WordPress host requirements.
  • The latest version of WordPress. If your version of WordPress is out of date, you’ll see a prompt to automatically upgrade with a single click, or can upgrade manually.
  • A WordPress.com account. Don’t have one yet? Sign up for one here, or create one during the Jetpack connection flow. You only need one WordPress.com account to access all our services (including Akismet, Crowdsignal, Gravatar, and WordPress.com itself). If you use any of these services, you already have a WordPress.com account to connect to Jetpack. You can reset your WordPress.com password if you need to.
  • A publicly accessible WordPress site: no password protection or Coming Soon / Maintenance Mode plugin in use. Jetpack Protect will not work on a local environment.
  • A publicly accessible XML-RPC file.

Install Jetpack Protect

To install Jetpack Protect via the WP Admin:

  1. Start at your WP Admin dashboard.
  2. Go to Plugins → Add New.
  3. Search for Jetpack Protect. The latest version will show in the search results. The Jetpack Protect plugin has additional features and can be installed alongside the Jetpack plugin without any issues. Click Install Now.
Screenshot of the Jetpack Protect plugin from the WordPress plugin repo
  1. Click Activate.
  2. Choose a the Paid Plan for one-click threat fixes, automatic protection rules for the web application firewall, and other premium features. Or start for free.
  3. Your first scan will start.
  4. After a few minutes, your results will show on the Jetpack Protect page.
Screenshot of Protect results, indicating "No vulnerabilities found"

Check Protect results

Once you’ve activated the plugin and chosen your plan, your first malware scan will begin automatically.

The paid Scan plan sends you notifications any time there is a potential security warning. With the Free version, you will need to proactively check your Protect dashboard.

  1. Visit Jetpack → Protect in your WordPress admin panel to see the security threats and malware found by the integrated malware scanner.
  2. When the malware scanner finds a security threat, view the recommended actions on the Jetpack Protect dashboard to secure your sites.
  3. If you have upgraded to a paid Jetpack Scan plan, use the auto-fixer to resolve any threats. If you are on the Free plan, follow the recommendations given.

Note: Scans run roughly every 24 hours. It is not possible to set a time for the automated daily scans.

For even more tips on how to maintain good WordPress site security, read about How to Secure Your Site from Hackers.

Disable math captcha

To to turn off the math captcha option while still using Jetpack, add a filter to your site’s functions.php file or a custom functionality plugin. Here’s how you can disable the math fallback captcha:

add_filter( 'jpp_use_captcha_when_blocked', '__return_false' );

By adding this code, you’ll turn off the math captcha, but Jetpack Protect’s primary security functions will continue to work as normal.

Please be aware that code snippets are provided as a courtesy and our support team is unable to offer assistance customizing them further.

Jetpack Protect, Jetpack Scan, and WPScan: Understand the difference

Jetpack offers a variety of tools designed to enhance the security of your WordPress site by detecting and reporting on vulnerabilities. Each tool serves a unique function in protecting your digital presence.

Jetpack Protect

Jetpack Protect is a free plugin that checks your site daily for vulnerable plugins and themes. If vulnerable software is found, it will alert you via your WordPress Dashboard. Additionally, Jetpack Protect provides a basic web application firewall (WAF). 

You can run Jetpack Protect on its own or alongside the Jetpack plugin.

Jetpack Scan

Jetpack Scan is a paid upgrade that can be added to the Jetpack Protect plugin or to the Jetpack plugin. In addition to the features provided by Jetpack Protect, it provides real-time malware scanning and an enhanced web application firewall (WAF) while also enabling auto-fixes (where available) for security threats.

Jetpack Scan makes it easy to monitor your site’s security by providing automated email notifications of security threats.

WPScan

Jetpack Protect and Scan are powered by the same data that is available in Automattic’s enterprise-level WPScan.

Still need help?

Please contact support directly. We’re happy to advise.

Privacy Information

Jetpack Protect is deactivated by default. It can be activated at any time by installing the plugin and activating it. For general features and FAQs, please see our Jetpack Security features.

Data Used
Site Owners / Users

We use the data synced for authentication of some APIs, to check themes, plugins, and WordPress version against the WPScan API in the free version of the plugin.
Site Visitors

None.
Activity Tracked
Site Owners / Users

We track pageviews and clicks on pricing pages, clicks on upgrade prompts, and interactions with the application (example: what kinds of threats are clicked on).
Site Visitors

None.
Data Synced (Read More)
Site Owners / Users

We sync data related to installed plugins and themes, and WordPress version.
Site Visitors

None.
Comments Off on Jetpack Protect

Jetpack WAF (Web Application Firewall)

Looking for more information about using the WAF with the Jetpack Protect plugin? See our article about the Jetpack Protect Plugin.

Jetpack’s WAF (Web Application Firewall) examines incoming traffic to a WordPress site and decides to allow or block it based on various rules. This adds an important layer of protection to your site, particularly when attackers actively exploit unpatched vulnerabilities.

With the WAF, you can configure IP addresses that will never be blocked (even if a rule would normally) or always be blocked (regardless of the rules). To allow or block incoming traffic based on various rules, you will need a plan that includes Jetpack Scan, such as Jetpack Security, Jetpack Complete, or Jetpack Scan, and a connection to your WordPress.com account.

If you previously had a Jetpack plan that includes Jetpack Scan and/or your site becomes disconnected from your WordPress.com account, you will continue to have access to the firewall settings in your Jetpack dashboard. This is to ensure that your IP allow/block lists and previous firewall rules remain functional.

Turning on the firewall

This feature is deactivated by default when you connect Jetpack to your WordPress.com account. It can be activated at any time on your Jetpack Settings page. To enable Jetpack WAF:

  1. Select Jetpack → Settings → Security → Firewall in your site’s WP Admin
  2. Enable Protect your site with Jetpack’s Web Application Firewall

How do I update the firewall options?

To add IP addresses to a block/allow list:

  1. Select Jetpack → Settings → Security → Firewall in your site’s WP Admin
  2. Enable Allow / Block list – Block or allow a specific request IP

You can add IP addresses to your block / allow list by entering complete IP addresses, separated by commas. Adding IP ranges or IP addresses in CIDR notation is not supported at the moment.

Once you’ve entered IP addresses to your block / allow list, click on Save Settings to save your block / allow list.

These are the firewall options:

  • Allow / Block list – Block or allow a specific request IP: This option allows you to add an IP blocklist and IP allowlist to your site.
  • Share data with Jetpack: This option allows Jetpack to collect data to improve the firewall protection and rules. You can check Jetpack Privacy before you set this option.
  • Enhance Protection:
  • You don’t need to activate Enhance Protection; however, if you want the firewall feature to be able to inspect all requests and run them before WordPress initializes, this is how:

In case you want to activate the Enhance protection, you need to contact your hosting support to make the changes on the server level.

Upgrade notification

If you don’t have a Scan subscription yet, a notification will show on your firewall options. After upgrading, the notification disappears.

Troubleshooting

What happens if I don’t renew my subscription?

Any rules delivered to the site will remain functional after the subscription lapses or is removed.

Can I use the IP allow and block lists behind a reverse proxy (like Cloudflare)?

The IP allowlists/blocklists currently have no way to configure trusted proxies and trusted headers and thus won’t work behind any sort of reverse proxy or load balancer setup.

My site went down after I activated the Firewall feature.

If you need to deactivate the firewall without access to the Jetpack settings screen, you can:

  • Modify your wp-config.php: add the line define( 'DISABLE_JETPACK_WAF', true ); to your wp-config.php file
  • Use WP-CLI: if you have WP-CLI installed, use the command wp jetpack-waf teardown

Still need help?

Please contact support directly. We’re happy to advise.

Privacy Information

This feature is deactivated by default. It can be activated at any time at Jetpack → Settings → Security → Firewall and by clicking on Protect your site with Jetpack’s Web Application Firewall.

Data Used
Site Owners / Users

This feature evaluates the incoming HTTP requests and blocks them if they’re considered malicious.

User data is used to authenticate some of our APIs. Installed themes and plugins and WordPress version are used to know which versions we should check against the WPScan API in the free version of the WAF.
Site Visitors

None.
Activity Tracked
Site Owners / Users

If the Share data with Jetpack checkbox is selected we track which rules caused a request to be blocked. We don’t track actual request data with this option.

Jetpack Firewall also tracks when settings in the Firewall settings are turned on or off.

If the Share data with Jetpack checkbox is selected we track the following data of requests that trigger a WAF block:
  • Information about the rule that triggered the blockRequest URIUser agentRefererContent typeGET params
If the Share detailed data with Jetpack checkbox is selected we also track the following data for requests that triggered the block alongside the previously mentioned data:
  • POST params
  • Header data
Site Visitors

None.
Data Synced (Read More)
Site Owners / Users

Information about users/admins, installed themes and plugins, and WordPress version.
Site Visitors

None.

For general features and FAQs, please see our Jetpack Security features.

Comments Off on Jetpack WAF (Web Application Firewall)

Stop spam with Jetpack Akismet

Keep your website free of spam, improving the experience for everyone. (Except the spammers!)

Akismet uses state of the art algorithms and methods to block spam submissions. To date, Akismet has blocked more than 500 billion pieces of spam, averaging about 7.5 million per hour.

Activate Jetpack Akismet Anti-spam

Akismet is included in the following Jetpack plans:

To start protecting your site from spam, please follow these steps;

  1. Purchase a plan that includes Akismet.
  2. Connect your site to Jetpack.
  3. Confirm that Akismet is active on your site by going to Jetpack → Dashboard in WP Admin and scrolling to the Security section of the page.
  4. Click on Moderate Comments to view comments in WP Admin.
  5. If you don’t see the message about Jetpack Akismet Anti-spam monitoring comments, Upgrade or Activate Akismet.
  6. Confirm Akismet is working.
Screenshot of WP Admin dashboard, highlighting the Akismet Anti-spam card. It shows as "Active" with a link to `Moderate comments.`

Configure Jetpack Akismet Anti-spam

To adjust Akismet settings, follow these steps:

  1. Navigate to Jetpack → Anti-spam in WP Admin.
  2. API Key: The API key should be pre-filled when you purchase your Jetpack Akismet Anti-spam plan. If your API ever changes, you could adjust it here.
  3. Comments: Check this box to allow the number of approved comments to appear next to each comment author when viewing Comments in WP Admin.
  4. Strictness: Choose how you want to manage your spam. You can ask Jetpack Akismet Anti-spam to automatically discard spam or put in the spam folder for you to review.
  5. Privacy: To help comply with privacy laws like the GDPR, choose to display a privacy notice under your comment forms.

Set up Jetpack Akismet Anti-spam for contact forms

If you use Jetpack’s contact form (either the Form block, or the classic editor version), all of your contact form submissions are automatically checked for spam by Akismet. You can also manually mark comments as spam/not spam via the Feedback section of WP Admin.

For more information on using Jetpack Akismet Anti-spam with other form plugins, please see this support article from Akismet about how to use Akismet with your contact forms.

Turn off captchas

Jetpack Akismet Anti-spam filters comment and contact form submissions automatically, so you can remove any captchas that you are using.

Check usage

To see how Akismet is working, follow these steps:

  1. Start at WP Admin.
  2. Navigate to Jetpack → Anti-spam.
  3. Review the stats cards showing the number of spammy comments and submissions blocked on your site by Akismet.

Anti-spam comes with 10,000 checks for spam per month (API calls), which should be more than enough for a small business. If you need more API calls, you can upgrade to one of Akismet’s Enterprise Plans.

Teach Akismet

Anything that Jetpack Akismet Anti-spam thinks is spam is automatically moved to your site’s spam section. On the off chance that some spam does get through, please mark it as spam which will help Jetpack Akismet recognize similar submissions as spam in the future.

Still need help?

Please contact support directly. We’re happy to advise.

Comments Off on Stop spam with Jetpack Akismet

Clean Your Hacked WordPress Site

Resolve a hack without losing your website.

If you use Jetpack Scan to monitor your site, it will notify you of any potential threats. In many cases, these can be resolved with the click of a button. However, a one-click fix may not be possible when:

  • A website gets hacked too severely
  • Jetpack Scan is installed after the hack occurs

Jetpack Scan is not intended to be a service to clean up already hacked or malware-infected sites. We rely on the site being uninfected at the time of purchase and having a clean version to compare any changed files to.

This article will help guide you through the process of identifying and cleaning up a hacked site, as well as strengthening the site’s security to help prevent future hacks. Assistance with manual restores and site cleaning is outside the scope of support we can offer.

Detect if your site has been hacked

The following signs are a good indication that your site has been hacked:

  • Your site is redirecting to another website with malicious or spammy content
  • Your site contains links to spam sites, which you did not add, and you can’t remove them
  • You find pages on your site that you don’t recognize via a Google search
  • Google shows warnings for your site, such as “This site may be hacked,” “Deceptive site ahead,” “The site ahead contains malware,” etc.
  • You scan your site with a tool such as Jetpack Scan, and it detects security threats which can’t be resolved automatically
  • You can check if Google currently lists your site as unsafe with their Safe Browsing Site Status tool

Clean a hacked site

If you’re sure your site has been hacked, follow these steps to resolve the issue:

1. Contact your hosting provider

Your host should be the first port of call, as they may be aware of a wider issue, especially if you are on shared hosting. In most cases, your host may be able to deal with the issue for you, saving you a lot of work.

2. Restore from a backup

If you have a backup of your site from before it was hacked, either from your host or with a dedicated backup service like Jetpack Backup, then restoring to that point may do the trick.

However, if the hack lies within files that aren’t included in the backup, then the issue may remain even after restoring.

You could lose content added after the point you’re restoring to, so this may not be an ideal option.

3. Clean hacked files

If your host is unable to assist, and restoring the site is not an option, then it’s time to do some detective work to find the source of the problem. Make sure you have a full backup of your site before starting this, as removing/editing your site’s files can result in even more work if something goes wrong.

First, check the results of any malware plugins or services you’re using. They may provide a list of suspicious files, which is a good starting point.

Cleaning hacked WordPress core files

If the affected file(s) are part of WordPress core, you can compare the code to a clean download from WordPress.org and remove any code that doesn’t belong there.

Another option is to completely reinstall WordPress to ensure all core files are clean. You can do that via Dashboard > Updates, by clicking ‘Re-install now.’ It sounds scary, but this will only replace the files at the very core of WordPress and will not remove or replace any of your content, media, themes, or plugins.

Cleaning hacked Themes

If the infection is a part of a theme, you can install a fresh copy if you’re using it or uninstall the theme completely if you’re not using it. If you’re unable to clear the threat through this method, you should contact your theme’s developer for guidance.

Cleaning hacked Plugins

If the problem lies within a plugin, you can also install a fresh copy or delete it if you’re not using it as with the theme process above. Or advanced users can follow these steps:

  1. If you’re an advanced user and have the appropriate technical knowledge, check which plugin file is affected by the threat.
  2. Click “Edit this file” to see that plugin’s code
  3. Copy the URL slug of plugin (e.g. “code-snippets”)
  4. Search for that plugin’s slug on WordPress.org
  5. Go to Plugin > Development > Browse the code
  6. Find “Tags”
  7. Open tag matching your installed plugin version
  8. Locate the correct file and download it
  9. Open the file in a text editor
  10. Use “Find” and copy/paste the entire code from step 2 and search
  11. If the code matches the plugin’s code from the WordPress.org Plugin Repository, you have a false positive and the plugin is working as intended! If not, we recommend consulting with an expert who can clean the site safely.

If the plugin is not in the Repository, you can contact the plugin’s developer and have them check the code identified as malicious by Jetpack Scan.

Feeling Unsure About Cleaning Hacked Files?

Understanding and modifying your site’s files can be daunting, especially if you’re unsure about the affected files’ purpose. In such cases, you may consider consulting an expert who can help you clean the site safely.

This is particularly relevant if your site suffered a security breach before installing Jetpack Scan and now requires an intervention.

If you need a recommendation, we trust our partners at Codeable to provide you with the reliable and quality services of their highly vetted security experts. They offer free initial consultations to help you identify the full extent of security cleanup work required. After you post the project, Codeable’s experts will respond with clarifying questions so they can provide an accurate no-obligation estimate for your specific requirements.

Tighten security after cleaning your hacked site

Once your site is free from malware, it’s important to follow these steps to secure your site, as failing to do so may leave your site open to another hack from the same point of vulnerability.

1. Make sure WordPress and all of your themes and plugins are kept updated

Outdated plugins, themes, and WordPress files are an extremely common source of vulnerability. Keeping them all updated to the latest version is one of the best ways to protect your site and keep it running efficiently. Also, be sure to fully uninstall any themes or plugins you are not using.

2. Reset all passwords

In case any of your passwords have been compromised, you should change your password for everything you can think of, including your:

  • Hosting account
  • Email accounts
  • Website’s admin accounts
  • FTP/SFTP/SSH credentials
  • Database passwords
  • The password to unlock any device you’ve edited your site with

Make sure you use a strong and unique password for each site, device, or program to avoid a domino effect if one is ever compromised.

3. Enable Two-Step Authentication (2FA)

For enhanced security, we strongly advise enabling two-step authentication (2FA) for all sign-ins to your WP Admin area. Jetpack offers an easy-to-implement 2FA solution through WordPress.com Secure Sign On. For detailed instructions on activating this feature, visit Requiring Two-Step Authentication.

4. Audit your site’s user accounts

Check your user list via Users > All Users inside your site’s dashboard and make sure there aren’t any administrator accounts that you don’t recognize. Remove any suspicious user accounts.

5. Update your WordPress secret keys

Your site’s wp-config.php file contains secret keys/”salts” which are used for encryption. You should generate new secret keys and replace the old ones in that file. Your webhost may have an automatic tool on their side to do this.

6. Scan your site regularly

The measures above will help keep your site safe, but nothing is 100% guaranteed, so you should use an automated scanning service such as Jetpack Scan to make sure you are alerted of any future security threats so you can deal with them quickly.

Remove your site from “unsafe” lists

If your site is listed as unsafe by Google or McAfee, then you will likely still see warnings on your site even after the hacked files have been cleaned or even removed.

To get that warning lifted, request a review of your site from Google, or submit a dispute request from McAfee.

Comments Off on Clean Your Hacked WordPress Site

Protect your site with brute force protection

Protect yourself against unwanted login attempts with brute force protection. (Formerly known as Jetpack Protect.)

Activate

Screenshot of Brutce force protection setting, with it toggled ON.

To protect your website immediately, this feature is activated by default when you connect Jetpack to your WordPress.com account. You can deactivate and reactivate either from:

If this feature has locked your site’s login page and you cannot access your WP Admin, you can temporarily deactivate the brute force protection via your WordPress.com Dashboard under Settings > Security.

Settings

With brute force protection activated, you can allowlist IP addresses. Allowlisting may be necessary if you’ve made too many failed login attempts to your site or Jetpack has detected unusual behavior from your current IP address.

  1. Start by navigating to:
  • WP Admin: Jetpack → Settings → Security

or

  1. Enter the IP list you wish to add into the Always allowed IP addresses field.
  2. Separate multiple IP addresses with a comma.
  3. To specify a range, enter the low value and high value separated by a dash. Example: 12.12.12.1-12.12.12.100.

Your current IP address is also shown on the page, so you can easily add it to your allowlist.

Both IPv4 and IPv6 addresses are accepted.

Advanced Tip: You can also allowlist one IP address by setting it as the JETPACK_IP_ADDRESS_OK constant in your wp-config.php file like this: define('JETPACK_IP_ADDRESS_OK', 'X.X.X.X');

Dashboards

View a count of the “total malicious attacks blocked on your site” under the Security section of your Jetpack dashboard: WP Admin: Jetpack → Dashboard → Security → Brute force protection

Screenshot of the Jetpack dashboard in the WP Admin area. The Security section lists VaultPress Backups, Activity, Scan, Akismet Anti-spam, Brute force protection, and Downtime monitoring.

How it works

The length of time a block lasts is based on a number of factors and is not a set amount of time.

Math captcha on your login page

The math captcha is used as a fallback for the brute force protection feature. If your IP has been blocked due to too many failed login attempts, you may still access your site by correctly filling out the math captcha along with the correct login credentials. In very rare cases, you might see the captcha if you’ve not obtained an API key, or during times of very heavy attacks.

Brute force protection on Multisite

In a WordPress Multisite installation, you can log into any account that exists on the network through any login page on the network. As a result, if you have Jetpack’s Brute force protection active on some sites but not all, then no site is truly being protected.

To address this, please network enable Jetpack on your multisite installation and activate the brute force protection feature on the network’s primary site.  Once completed, Jetpack’s brute force protection feature will be activated on every site on your network, even if Jetpack isn’t connected on those sites.

Multiple blocked malicious login attempts

You may worry if you see a high number of blocked suspicious login attempts. But rest assured this means the feature is working as expected!

There are thousands of “bots” out there trying to gain access to sites all over the internet. No matter what size your site is, there’s always someone or something trying to “break in”. WordPress is very secure and usually the weakest point is someone’s password. Bots consequently try to guess people’s passwords to get in.

Jetpack’s brute force protection feature collects information from failed attempts from millions of sites and protects you from these attacks. For example, if a bot tried to gain access to site A, and then went to site B, Jetpack’s brute force protection would already know who this bot is and before it even tries to get into site B, it would be blocked.

Along with that, it’s also really important to have strong secure passwords.

Information about the blocked attacks

For example, you might be wondering:

  • Which usernames need more securing?
  • Is this via wp-login, or via XMLRPC?
  • From which IP addresses do these arrive?
  • When did these occur? Is there a pattern?
  • If these were found, how many more are there that were not detected?

We don’t have access to this information. Jetpack’s brute force protection was built to be lean and simple. It’s built in such a way that you don’t have to think about these questions or make any decisions. As such, the only data we store is the total number of attacks blocked.

Troubleshoot Jetpack brute force protection

Please read our brute force protection troubleshooting article for tips.

Still need help?

Please contact support directly. We’re happy to advise.

Privacy Information

Jetpack brute force protection is activated by default. It can be deactivated at any time by toggling the Brute force protection setting under Jetpack → Settings → Security on your WP Admin dashboard.

For general features and FAQs, please see our Jetpack Security features.

More information about the data usage on your site
Data Used
Site Owners / Users

In order to check login activity and potentially block fraudulent attempts, the following information is used: attempting user’s IP address, attempting user’s email address/username (i.e. according to the value they were attempting to use during the login process), and all IP-related HTTP headers attached to the attempting user.

Additionally, for activity tracking (detailed below): IP address, WordPress.com user ID, WordPress.com username, WordPress.com-connected site ID and URL, Jetpack version, user agent, visiting URL, referring URL, timestamp of event, browser language, country code.

Site Visitors

In order to check login activity and potentially block fraudulent attempts, the following information is used: attempting user’s IP address, attempting user’s email address/username (i.e. according to the value they were attempting to use during the login process), and all IP-related HTTP headers attached to the attempting user.

Activity Tracked
Site Owners / Users

Failed login attempts.

We track when, and by which user, the feature is activated and deactivated. We also set a cookie (jpp_math_pass) for 1 day to remember if/when a user has successfully completed a math captcha to prove that they’re a real human. Learn more about this cookie.

Site Visitors

Failed login attempts.

We set a cookie (jpp_math_pass) for 1 day to remember if/when a user has successfully completed a math captcha to prove that they’re a real human. Learn more about this cookie.

Data Synced (Read More)
Site Owners / Users

Options that identify whether or not the feature is activated and how its available settings are configured. We also sync the site’s allowlisted entries (as configured by the site owners), the Protect-specific API key used for login checking, and any failed login attempts, which contain the user’s IP address, attempted username or email address, and user agent information.

Site Visitors

Failed login attempts, which contain the user’s IP address, attempted username or email address, and user agent information.

Comments Off on Protect your site with brute force protection

Jetpack Scan

You can review security scan results in one centralized location, fix problems, and restore backups. If Jetpack does notice a problem, you’ll receive an instant email alert. You can repair the majority of security threats with just one click and get back to running your business.

Take a look at all the security features Jetpack offers.

Overview: The content below offers a comprehensive overview of Jetpack Scan, a powerful security scanning tool by Jetpack. It explains the features, benefits, and important details regarding the use of Jetpack Scan, including which plans include it, how to get started, the importance of server credentials, navigating the dashboard, frequency of scans, fixing threats, and privacy information. Users can learn about the types of threats detected, examples of threats, and how Jetpack Scan helps enhance the security of WordPress sites.

Important: Jetpack Scan is not intended to be a service to clean up already hacked or malware-infected sites. While Jetpack Scan can fix some hacked files after purchase, we do rely on the site not being infected at the time of purchase and having a clean version to compare any changed files to. In that case, we suggest following this guide to cleaning a hacked site.

Which Plans Include Jetpack Scan?

Jetpack Scan is available to users who have purchased the Jetpack Scan, Jetpack Security, or Jetpack Complete plans. It is also the scan solution for any new Jetpack Security or Jetpack Complete purchase.

Note: Once the site is connected to Jetpack Scan, your site will remain on the Jetpack Scan solution, even if you change or add a Jetpack plan or move your site to a new host.

Getting Started

Jetpack Scan is activated as soon as your purchase is complete, and your first scan is kicked off immediately.

Note: In order for Jetpack Scan to scan a website, it needs to be able to create files in the /jetpack-temp/ directory (which is located in the root of the site alongside /wp-content/ and /wp-includes/. It writes a temporary helper file to this directory during the scan and removes it after the scan is complete.

If your site is hosted on a server that prevents files from being changed, you will need to work with your host to ensure that Jetpack is able to write files to the /jetpack-temp/ directory.

Adding Server Credentials to Jetpack Scan

Jetpack can scan your site without any server credentials, but server credentials are required to use one-click fixes. The server credentials can also help make the scans faster and more reliable.

Read more on how to add remote access/server credentials.

Navigating the Jetpack dashboard

You can reach the Jetpack Scan from your WP Admin dashboard by following these steps:

  1. Access the Jetpack.com dashboard by clicking on Scan within the Jetpack options in WP Admin. If prompted, authorize your WordPress.com account.
  2. Upon reaching the Scan page, you will encounter two interfaces: Scanner and History.
  3. The scanner page offers a quick overview of the site’s current status, displaying either that the site is in good condition or listing any active threats.
  4. To commence a new scan, just click the Scan now button.

On the History page, you’ll see a list of all threats the site suffered from in the past. They can be filtered by their fix/ignore status, and ignored threats can be fixed.

Peace of Mind

Once a scan completes, you will receive a notification if any threats are found. These notifications will be in WP Admin, via email, and on your WordPress.com dashboard.

What data is scanned?

Jetpack scans:

  • All files in the pluginsmu-pluginsthemes, and uploads directories.
  • Select files from your WordPress root directory, like wp-config.php.
  • Other select files inside the wp-content directory.

What data is not scanned?

  • Jetpack does not scan your site’s database.

How often do scans occur?

Scans occur daily or when manually triggered.

How do I fix threats?

When Jetpack Scan detects a threat to your site, you have the following options:

  • When a threat is detected, and you’re notified, we offer a one-click fix for most problems.
  • You will find the “Auto-fix all” button to handle all the threats at once.
  • Clicking on the threat will provide more information about the problem and what can be fixed. You will also see the buttons to “Ignore threat” or “Fix threat”.
  • Ignoring or fixing the threat will create a history of scan threats you can view that you can view in the History tab.

However, sometimes a website can get hacked more severely, meaning a one-click fix by Jetpack Scan is impossible. In that case, we suggest following this guide to cleaning a hacked site. It will help guide you through identifying and cleaning up a hacked site and strengthening the site’s security to help prevent future hacks.

Examples of Threats that Jetpack Scan May Find

Changes to Core WordPress Files

Jetpack Scan will check your WordPress installation to see if any core files have been changed or deleted. Generally, these files should never be changed, so please remember when working on your site. WordPress functionality can and should be altered by using plugins and themes instead.

If you didn’t make the changes to your core WordPress files, you should consider the files suspicious and consider replacing them. You can always contact us if you’re unsure of the changes you see.

Other Vulnerabilities

Web-based shells give an attacker full access to your server — allowing them to execute malicious code, delete files, make changes to your database, and many more dangerous things.

Shells are usually found in files, and they can be removed by deleting any infected files from your server and replacing them with a clean version from your backup.

Outdated or insecure plugins

Plugins that have known security vulnerabilities will be detected by Jetpack Scan. If a newer version has patched the threat, you can update the plugin with one click. We allow you to delete the plugin from your site if there is no newer version with a fix.

You’re always welcome to contact us if you have any questions about security threats or suspicious codes.

Multisite

Currently, Jetpack Scan does not support multisite.

Still need help?

Please contact support directly. We’re happy to advise.

Privacy Information

Jetpack Scan is deactivated by default and requires an upgrade to a paid solution (Jetpack Scan, Jetpack Security, or Jetpack Complete) to unlock/activate.

Data Used
Site Owners / Users

We currently scan the following data: files in your plugins, themes, and uploads directories, and select files from your WordPress root directory and `wp-content` directory. This includes all WordPress’s unique and irreplaceable data and everything properly integrated into the WordPress installation.

In addition to the data we scan, we also use (and store) your server access credentials (if provided): SSH and/or FTP/SFTP. These credentials are explicitly provided by you when activating Jetpack Scan.

For feature usage tracking (detailed below): IP address, WordPress.com user ID, WordPress.com username, WordPress.com-connected site ID, user agent, referring URL, timestamp of event, browser language, country code, and user site count.
We may also use scanned content to improve our performance but do not otherwise store it long-term.
Site Visitors

None.
Activity Tracked
Site Owners / Users

We track several events around the usage of this feature: requests to view threats, fix threats, run a scan, and click on the header of a threat (in the scan scanner and in the scan history).
Site Visitors

None.
Data Synced (Read More)
Site Owners / Users

None.
Site Visitors

None.
Comments Off on Jetpack Scan

Troubleshoot Jetpack Brute Force Attack Protection

Having problems with the Brute force attack protection feature on your site? Check these tips to find out why and learn more about our error messages.

Unblock your IP address

If Jetpack has flagged your IP address for any reason, it may block you from logging in. If you do get locked out, you’ll see a message “Jetpack has locked your site’s login page. Your IP has been flagged for potential security violations.”

To resolve this:

  1. Enter your email address and hit Send.
  2. You will receive an email with a special link you can click to regain access to the login form.
  3. If you get an error when clicking the link in the email, you can allowlist your IP address to unblock yourself.
  4. If you are still blocked, it’s likely due to a configuration issue on your server. You can disable Brute Force Protection to regain access to your site, then contact us for help with further troubleshooting.

Resolve a “Server misconfigured” error

You may see the message “Brute Force Attack Protection is unable to effectively protect your site because your server is misconfigured.”

Whenever someone tries to log in to your site, Brute Force Attack Protection feature looks at that person’s IP address and compares it with our global database of malicious IP addresses.

For this to work properly, we rely on IP addresses stored and provided by your server. In some cases your server may not return any IP address, thus blocking brute force protection from working properly. When this happens, the feature will be disabled and we will let you know.

If that happens, please send a link to this page to your hosting provider, so they can take a look and fix the issue for you. They can also contact us directly via this contact form if they need more information.

Still need help?

Please contact support directly. We’re happy to advise.

Comments Off on Troubleshoot Jetpack Brute Force Attack Protection

Security

Jetpack includes state-of-the-art security tools that keep your site safe and sound, from posts to plugins.

Are you blocked from accessing your dashboard?

Use one of the three methods described here to unblock yourself.

Here are some resources to help get you started:

  • Use MainWP Extensions for Jetpack Protect and Scan - Scan and fix multiple WordPress websites from a centralized dashboard, combining the power of Jetpack and MainWP. This article is only for customers using MainWP alongside Jetpack. If you’re not using MainWP, please see our general documentation about Jetpack Scan. The Jetpack Protect Extension for MainWP To use the Jetpack Protect Extension for MainWP, you […]
  • Jetpack Firewall in the Jetpack Protect Plugin - Jetpack Firewall examines incoming traffic to your site and decides to allow or block it based on various rules. This adds an important layer of protection to your site, particularly when attackers actively exploit unpatched vulnerabilities.  The Firewall Premium features require a connection to a WordPress.com account and a plan that has a Scan feature, […]
  • Jetpack Protect - Stay ahead of security threats and malware, keeping your site safe with Jetpack Protect. Scan your site and get warned about vulnerabilities. Protect your reputation and revenue by avoiding a hacked website. Requirements for Jetpack Protect Install Jetpack Protect To install Jetpack Protect via the WP Admin: Check Protect results Once you’ve activated the plugin […]
  • Jetpack WAF (Web Application Firewall) - Looking for more information about using the WAF with the Jetpack Protect plugin? See our article about the Jetpack Protect Plugin. Jetpack’s WAF (Web Application Firewall) examines incoming traffic to a WordPress site and decides to allow or block it based on various rules. This adds an important layer of protection to your site, particularly […]
  • Stop spam with Jetpack Akismet - Keep your website free of spam, improving the experience for everyone. (Except the spammers!) Akismet uses state of the art algorithms and methods to block spam submissions. To date, Akismet has blocked more than 500 billion pieces of spam, averaging about 7.5 million per hour. Activate Jetpack Akismet Anti-spam Akismet is included in the following […]
  • Clean Your Hacked WordPress Site - Resolve a hack without losing your website. If you use Jetpack Scan to monitor your site, it will notify you of any potential threats. In many cases, these can be resolved with the click of a button. However, a one-click fix may not be possible when: Jetpack Scan is not intended to be a service […]
  • Protect your site with brute force protection - Jetpack Protect allows you to protect yourself against traditional brute force attacks and distributed brute force attacks that use many servers against your site
  • Jetpack Scan - Jetpack Scan offers automated malware scanning and one-click threat resolution.
  • Troubleshoot Jetpack Brute Force Attack Protection - Are you unable to enable the Protect feature on your site? Check these tips to find out why.
  • Security - Jetpack includes state-of-the-art security tools that keep your site safe and sound, from posts to plugins. Protection from brute force attacks 24/7 downtime monitoring Secure Sign-On Automatic plugin updates And more Are you blocked from accessing your dashboard? Use one of the three methods described here to unblock yourself. Here are some resources to help […]

Our paid subscriptions offer even more ways to protect and monitor your site — learn more here.

Privacy Information

Comments Off on Security
  • Enter your email address to follow this blog and receive news and updates from Jetpack!

    Join 112.8K other subscribers
  • Browse by Topic