Hi,
Put this into /etc/fail2ban/filter.d/wordpress.conf :
# Fail2Ban filter for WordPress

[INCLUDES]

before = common.conf

[Definition]

_daemon = (?:wordpress|wp)

failregex = ^%(__prefix_line)sAuthentication attempt for unknown user .* from 
<HOST>$
            ^%(__prefix_line)sBlocked user enumeration attempt from <HOST>$
            ^%(__prefix_line)sBlocked authentication attempt for .* from <HOST>$
            ^%(__prefix_line)sPingback error .* generated from <HOST>$
            ^%(__prefix_line)sSpam comment \d+ from <HOST>$
            ^%(__prefix_line)sXML-RPC authentication attempt for unknown user 
.* from <HOST>$
            ^%(__prefix_line)sXML-RPC multicall authentication failure from 
<HOST>$

ignoreregex =

# DEV Notes:
# Requires the 'WP fail2ban' plugin:
# https://wordpress.org/plugins/wp-fail2ban/
#
# Author: Charles Lecklider
For the rest of setup process, please, check this nice article:
https://bjornjohansen.no/using-fail2ban-with-wordpress 
<https://bjornjohansen.no/using-fail2ban-with-wordpress>

Regards,
Denis

> On 24 Oct 2018, at 20:17, Mike <[email protected]> wrote:
> 
> 
> Does anybody have any examples of sample jail configurations to identify 
> Wordpress vulnerability probes?
> 
> If someone can give me a skeleton, I can work on creating something that IDs 
> malicious attempts to hack into wordpress.  I just need a basic framework.
> 
> 
> 
> _______________________________________________
> Fail2ban-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/fail2ban-users

_______________________________________________
Fail2ban-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to