Greetings ... maybe someone had experience protecting admins from brute force? On the server, hundreds of sites. There is protection by the number of connections, but the bots have now become smarter - they make only a small number of requests per minute, which is almost imperceptible, while creating an unnecessary, unpleasant load on the processor.
46.172.83.5 - - [28/Jun/2016:11:36:55 +0300] "POST /wp-login.php HTTP/1.1" 403 2769 "-" "Mozilla/5.0 (Windows NT 5.1; rv:29.0) Gecko/20100101 Firefox/29.0" "-" 46.172.83.5 - - [28/Jun/2016:11:37:04 +0300] "POST /wp-login.php HTTP/1.1" 200 5021 "-" "Mozilla/5.0 (Windows NT 5.1; rv:29.0) Gecko/20100101 Firefox/29.0" "-" 46.172.83.5 - - [28/Jun/2016:11:37:09 +0300] "GET /wp-login.php HTTP/1.1" 200 3498 "-" "Mozilla/5.0 (Windows NT 5.1; rv:29.0) Gecko/20100101 Firefox/29.0" "-" 46.172.83.5 - - [28/Jun/2016:11:37:09 +0300] "POST /wp-login.php HTTP/1.1" 200 4488 "-" "Mozilla/5.0 (Windows NT 5.1; rv:29.0) Gecko/20100101 Firefox/29.0" "-" 46.172.83.5 - - [28/Jun/2016:11:37:10 +0300] "GET /wp-login.php HTTP/1.1" 200 3316 "-" "Mozilla/5.0 (Windows NT 5.1; rv:29.0) Gecko/20100101 Firefox/29.0" "-" 46.172.83.5 - - [28/Jun/2016:11:37:11 +0300] "POST /wp-login.php HTTP/1.1" 200 4307 "-" "Mozilla/5.0 (Windows NT 5.1; rv:29.0) Gecko/20100101 Firefox/29.0" "-" 46.172.83.5 - - [28/Jun/2016:11:37:12 +0300] "GET /wp-login.php HTTP/1.1" 403 2769 "-" "Mozilla/5.0 (Windows NT 5.1; rv:29.0) Gecko/20100101 Firefox/29.0" "-" 46.172.83.5 - - [28/Jun/2016:11:37:12 +0300] "GET /wp-login.php HTTP/1.1" 403 2769 "-" "Mozilla/5.0 (Windows NT 5.1; rv:29.0) Gecko/20100101 Firefox/29.0" "-" 46.172.83.5 - - [28/Jun/2016:11:37:12 +0300] "POST /wp-login.php HTTP/1.1" 403 2769 "-" "Mozilla/5.0 (Windows NT 5.1; rv:29.0) Gecko/20100101 Firefox/29.0" "-" What to do with them? Maybe share your experiences? ..
I tried to do it with nginx, but the problem is ...