Monkey Trapped Login

Monkey Trapped Login is a WordPress Plugin created to protect your site from Brute Force Login Attacks. Monkey Trapped Login protects against automate

Author:konnun (profile at wordpress.org)
WordPress version required:3.0.1
WordPress version tested:4.0
Plugin version:1.1.0
Added to WordPress repository:11-09-2014
Last updated:11-09-2014
Warning! This plugin has not been updated in over 2 years. It may no longer be maintained or supported and may have compatibility issues when used with more recent versions of WordPress.
Rating, %:0
Rated by:0
Plugin URI:http://monkeytrapped.com/
Total downloads:680
Active installs:20+
plugin download
Click to start download

Monkey Trapped Login is a WordPress Plugin created to protect your site from Brute Force Login Attacks. Automated attacks will be shut down before using up your resources and won't be able to continue guessing your admin user name and password.

Features include: Configurable maximum failed login attempts to trigger a lockout Configurable length of lockout Limits the number of allowed login attempts using the login form Limits the number of allowed login attempts using Auth Cookies Manually whitelist trusted IP addresses (never blocked) Manually block known bad IP addresses (always blocked unless also on the whitelist) Auto-whitelists the IP of the installer (can be removed after install) Admin can view a list of all locked out IP addresses (active and historical) Resets failed login attempts on a successful login Configurable message to show to blocked users Replaces standard login error with "Login Failed" so hackers won't know if the user name is right or not

Optional Features (all free) Admin notifications by email on any lockout Notify Monkey Trapped server of hacking attempts on your site.

If you select “Participate” on the Settings->Monkey Login page, Monkey Trapped Login will send a message to the Monkey Trapped server to help build a comprehensive brute force attacker black list.

NOTE: No plugin is a replacement for strong passwords. Also, never use "admin" as the administrator user name. "admin" is the most common user name used in brute force attacks.