It is common that brute force attacks take place on WordPress login pages to guess username and passwords. Several plugins and htaccess codes are in place to thwart such illegal intrusion. One such way to lock invalid usernames and prevent unauthorized users from guessing confidential usernames is using the Wordfence plugin.

Most of the time naive WordPress admin users use easy guessing usernames like “admin”, “www”, sitename etc. In addition, due to password leaks, some of the common usernames are leaked. In my practice I found that Wordfence blocks several such attempts and also gives the common usernames used for hacking.

It is one of the best security methods that can fix invalid username problems. In this guide we are going to see a free way to block brute force attacks and the right settings.

How to Lock Invalid Usernames Attack in 2022?

  1. Install the free version of Wordfence login.
  2. Wordfence > Firewall
  3. Click on All Firewall Options on the right hand side.
  4. Next screen opens.
  5. Under Brute Force Protection, check the option for “Enable brute force protection” is turned on.
  6. Immediately lock out invalid usernames is checked.
  7. Immediately block the IP of users who try to sign in as these usernames text box is visible.
  8. Enter the common usernames like admin, www etc, which are used by hackers.
  9. Press Enter after each username.
  10. In due time, if you see further attempts with any other invalid usernames, you can add them also.

Other Settings

  1. Lock out after how many login failures – 4 to 6
  2. Lock out after how many forgot password attempts – 4 to 6
  3. Count failures over what time period – 12 hours to max
  4. Amount of time a user is locked out – 2 months

Final Thoughts

In this way you can prevent suspicious IPs from trying to log into your WordPress panel. It has the benefit of two things. One it prevents attacks and other saves precious CPU resources getting wasted due to these hacks.

Your wordpress admin panel will become a lot quicker with less number of attacks.

Leave a Reply

Your email address will not be published.