Are you unable to enable the Brute force attack protection feature on your site? Check these tips to find out why.
Brute Force Attack Protection is unable to effectively protect your site because your server is misconfigured.
Whenever someone tries to log in to your site, Brute Force Attack Protection feature looks at that person’s IP address and compares it with our global database of malicious IP addresses.
We rely on IP addresses stored and provided by your server for this to work properly. Unfortunately, your server may not return any IP address in some cases, thus blocking Brute Force Attack Protection from working properly. The Brute Force Attack Protection feature will be disabled when this happens, and we will let you know.
If that happens, do not hesitate to send a link to this page to your hosting provider, so they can take a look and fix the issue for you. They can also contact us directly via this contact form if they need more information.
Unblock yourself when your IP address was blocked by Brute Force Attack Protection feature
If you tried to log in to your site multiple times but failed to log in because you had forgotten your password, you may end up being blocked by Brute Force Attack Protection feature.
Enter your email address and hit Send. You will receive an email with a special link you can click to regain access to the login form.
If you get an error when clicking the link in the email, you can follow one of the three methods described here under Jetpack locked me out. What can I do? to unblock yourself.
If you are still blocked, it’s likely due to a configuration issue on your server. Please contact us for help fixing that.
Brute Force Attack Protection on Multisite Networks
In a WordPress Multisite installation, you can log in to any account that exists on the network through any log-in page on the network. As a result, if you have Brute Force Attack Protection active on some sites but not all, then no site is truly being protected.
To address this, please network enables Jetpack on your multisite installation and activate the Brute Force Attack Protection feature on the network’s primary site. Once completed, Brute Force Attack Protection feature will be activated on every site on your network, even if Jetpack isn’t connected to those sites.
Brute Force Attack Protection reports thousands of blocked malicious login attempts
The best way to explain this feature is that there are thousands of “bots” out there trying to gain access to sites all over the internet. No matter what size your site is, there’s always someone or something trying to “break in”. WordPress is very secure and usually the weakest point is someone’s password. Bots consequently try to guess people’s passwords to get in.
Brute Force Attack Protection feature collects information from failed attempts from millions of sites and protects you from these attacks. For example, if a bot tried to gain access to site A, and then went to site B, Brute Force Attack Protection would already know who this bot is and before it even tries to get into site B, it would be blocked.
Along with that, it’s also really important to have strong secure passwords.
Find out more information about the Brute Force Attack Protection feature here.
If you have more questions, do not hesitate to contact us!