Make Safe and Secure WordPress hacking attack from xmlrpc

WordPress hacking attack from xmlrpc

Brute-Force-Attack-via-XML-Safe and Secure WordPress uses are not easy. Hackers are always trying to hack your WordPress site. WordPress site hacking is simple if you not using security. An important php file of your WordPress root folder is xmlrpc.php. You can check the status of your xmlrpc.php file. Go Browser and type If it says the message “XML-RPC server accepts POST requests only.” So, you may face xmlrpc attack.

xmlrpc.php script supports WP function to remotely publish posts via email and get pingbacks. Hackers are going to the root of your WordPress site and inject some scripts via xmlrpc DDoS attacks to get your username and password.

Block the xmlrpc hacking attempt

Blocking xmlrpc hacking, you should edit your .htacess file. Simply paste the following code to the below of default code.

# BEGIN protect xmlrpc.php

<files xmlrpc.php>

order allow,deny

deny from all


# END protect xmlrpc.php

After doing that go your dashboard and click settings than go discussion. There look default article settings. Top two item must be unmarked. Thanks all.


About Author:

I am a blogger since 6 years. Learning about blogging, SEO and online marketing. I have written 250+ blog post and 3000+ comments in different blogs.

2 thoughts on “Make Safe and Secure WordPress hacking attack from xmlrpc

Leave A Comment

Your email address will not be published. Required fields are marked *

CommentLuv badge