- Server operating system version
- Debian 11
- Plesk version and microupdate number
- v18.0.59
Hello,
I think I have a setting problem with Fail2ban wordpress filter because I unfortunately have attacks of this type, and Fail2ban does not ban any IP.
The default setting is:
And here's an example of the attack attempts I'd like to block:
Could you tell me what settings to add to this jail so that this type of attack is detected and banned?
Thank you very much!
I think I have a setting problem with Fail2ban wordpress filter because I unfortunately have attacks of this type, and Fail2ban does not ban any IP.
The default setting is:
[Definition]
failregex = ^<HOST>.* "POST .*/wp-login.php([/\?#\\].*)? HTTP/.*" 200
ignoreregex =
And here's an example of the attack attempts I'd like to block:
GET //wp-includes/wlwmanifest.xml HTTP/1.0
GET //xmlrpc.php?rsd HTTP/1.0
GET //blog/wp-includes/wlwmanifest.xml HTTP/1.0
GET //web/wp-includes/wlwmanifest.xml HTTP/1.0
GET //wordpress/wp-includes/wlwmanifest.xml HTTP/1.0
GET //website/wp-includes/wlwmanifest.xml HTTP/1.0
GET //wp/wp-includes/wlwmanifest.xml HTTP/1.0
GET //news/wp-includes/wlwmanifest.xml HTTP/1.0
GET //2018/wp-includes/wlwmanifest.xml HTTP/1.0
GET //2019/wp-includes/wlwmanifest.xml HTTP/1.0
GET //shop/wp-includes/wlwmanifest.xml HTTP/1.0
GET //wp1/wp-includes/wlwmanifest.xml HTTP/1.0
GET //test/wp-includes/wlwmanifest.xml HTTP/1.0
GET //media/wp-includes/wlwmanifest.xml HTTP/1.0
GET //wp2/wp-includes/wlwmanifest.xml HTTP/1.0
GET //site/wp-includes/wlwmanifest.xml HTTP/1.0
GET //shop/wp-includes/wlwmanifest.xml HTTP/1.0
GET //cms/wp-includes/wlwmanifest.xml HTTP/1.0
GET //sito/wp-includes/wlwmanifest.xml HTTP/1.0
GET //wp-head.php HTTP/1.0
POST /wp-plain.php HTTP/1.0
Could you tell me what settings to add to this jail so that this type of attack is detected and banned?
Thank you very much!