Limit the number of login attempts that possible both through the normal login as well as using the auth cookies.
WordPress by default allows unlimited login attempts either through the login page or by sending special cookies. This allows passwords (or hashes) to be cracked via brute-force relatively easily.
Limit Login Attempts Reloaded blocks an Internet address from making further attempts after a specified limit on retries has been reached, making a brute-force attack difficult or impossible.
- Limit the number of retry attempts when logging in (per each IP). This is fully customizable.
- Limit the number of attempts to log in using authorization cookies in the same way.
- Informs the user about the remaining retries or lockout time on the login page.
- Optional logging and optional email notification.
- Handles server behind the reverse proxy.
- It is possible to whitelist IPs using a filter. But you probably shouldn’t do this.
All your settings will be kept in tact!
Many languages are currently supported in Limit Login Attempts Reloaded plugin but we welcome any additional ones.
Help us bring Limit Login Attempts Reloaded to even more cultures.
Translations: Bulgarian, Brazilian Portuguese, Catalan, Chinese (Traditional), Czech, Dutch, Finnish, French, German, Hungarian, Norwegian, Persian, Romanian, Russian, Spanish, Swedish, Turkish
Plugin uses standard actions and filters only.
Mitwirkende & Entwickler
„Limit Login Attempts Plus – WordPress Limit Login Attempts By Felix“ ist Open-Source-Software. Folgende Menschen haben an diesem Plugin mitgewirkt:Mitwirkende
„Limit Login Attempts Plus – WordPress Limit Login Attempts By Felix“ wurde in 7 Sprachen übersetzt. Danke an die Übersetzerinnen und Übersetzer für ihre Mitwirkung.
Übersetze „Limit Login Attempts Plus – WordPress Limit Login Attempts By Felix“ in deine Sprache.
Interessiert an der Entwicklung?
Durchstöbere den Code, sieh dir das SVN Repository an oder abonniere das Entwicklungsprotokoll per RSS.
- Settings are moved to a separate page.
- Fixed: login error message.
- A security issue inherited from the ancestor plugin Limit Login Attempts has been fixed.
- GDPR compliance implemented.
- Fixed: ip_in_range() loop $ip overrides itself causing invalid results.
- Fixed: the plugin was locking out the same IP address multiple times, each with a different port.
- Added support of Sucuri Website Firewall.
- Fixed the issue with backslashes in usernames.
- Plugin returns the 403 Forbidden header after the limit of login attempts via XMLRPC is reached.
- Added support of IP ranges in white/black lists.
- Lockouts now can be released selectively.
- Fixed the issue with encoding of special symbols in email notifications.
- Added Multi-site Compatibility and additional MU settings.
- Usernames and IP addresses can be white-listed and black-listed now.
- The lockouts log has been inversed.
- IP addresses can be white-listed now.
- A „Gateway“ column is added to the lockouts log. It shows what endpoint an attacker was blocked from.
- The „Undefined index: client_type“ error is fixed.
- The site connection settings are now applied automatically and therefore have been removed from the admin interface.
- Now compatible with PHP 5.2 to support some older WP installations.
- Plugin release