My server was under attack by one and the same IP for multiple domains. Normally this IP would get blocked very soon because the Brute Force Monitor scans the Wordpress logs. Except, this one didn't. I blocked the IP manually and went looking for the source of the problem. The access log looked like this:
What I can see here is that instead of using one forward slash the attacker used two slashes. Normally one would look for the login page on "/wp-login.php" but this attack took place on "//wp-login.php". Note the double //. My guess is that the BFM ignores this page as not being a login page. Maybe a developer can take a look at this? Because Wordpress does accept requests on this URL.
Code:
167.88.60.248 - - [12/Oct/2021:09:35:32 +0200] "POST //wp-login.php HTTP/1.0" 200 9396 "https://mydomain.com//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4240.193 Safari/537.36"
167.88.60.248 - - [12/Oct/2021:09:35:35 +0200] "POST //wp-login.php HTTP/1.0" 200 9396 "https://mydomain.com//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4240.193 Safari/537.36"
167.88.60.248 - - [12/Oct/2021:09:35:39 +0200] "POST //wp-login.php HTTP/1.0" 200 9396 "https://mydomain.com//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4240.193 Safari/537.36"
What I can see here is that instead of using one forward slash the attacker used two slashes. Normally one would look for the login page on "/wp-login.php" but this attack took place on "//wp-login.php". Note the double //. My guess is that the BFM ignores this page as not being a login page. Maybe a developer can take a look at this? Because Wordpress does accept requests on this URL.