| 开发者 | inilerm |
|---|---|
| 更新时间 | 2026年1月7日 17:32 |
| 捐献地址: | 去捐款 |
| PHP版本: | 8.1 及以上 |
| WordPress版本: | 6.9 |
| 版权: | GPLv2 or later |
| 版权网址: | 版权信息 |
Important Note on PHP Version: To ensure maximum security and access to all features, we strongly recommend using PHP 8.1 or higher. Some advanced features (like the local MaxMind database or full 2FA management via WP-CLI) require PHP 8.1.Key Features:
wp-config.php, readme.html, .git) at the server level with a single click./scan/. (Requires manual configuration).wp-login.php and xmlrpc.php with a JavaScript challenge during sustained distributed attacks, preventing server overload.advanced-ip-blocker folder to the /wp-content/plugins/ directory.Security > Dashboard > System Status to ensure your IP and your server's IP are whitelisted. Use the one-click buttons if they are not.The scanner checks your site in two ways: Local Scan: Checks for outdated PHP versions, WordPress core updates, debug mode risks, and SSL status. This runs locally and instantly. Deep Scan (Vulnerability Audit): Checks your installed plugins and themes against our central database of known security vulnerabilities (CVEs). This process is manual (you click a button) to ensure it never slows down your site during normal operation.
To ensure maximum performance as the network grows. Storing thousands of IPs in standard WordPress options (wp_options) can slow down a site. By moving this data to a dedicated, indexed database table (wp_advaipbl_community_ips), we ensure that lookups are lightning-fast (O(1) complexity) and consume negligible memory, regardless of how many threats we track.
It is a collaborative security feature where users share anonymized data about verified attacks (like SQL injections caught by the WAF or IPs flagged by AbuseIPDB). Our central server aggregates this data to create a global blocklist of active threats. You can choose to contribute data ("Join") and/or use the global list to protect your site ("Enable Blocking").
No. The data sharing happens in the background via a low-priority scheduled task (Cron) just a few times a day. The global blocklist is downloaded locally and cached, so checking an IP against it is instant (microseconds) and does not require external API calls.
You need a free Cloudflare account and your domain must be using Cloudflare's nameservers.
Yes. Safety is our priority.
The "Server-Level Firewall (.htaccess)" feature relies on Apache/LiteSpeed specific files. If you use Nginx (without Apache), these local rules will be ignored by the server. Recommendation: For Nginx users, we strongly recommend enabling the Cloud Edge Defense (Cloudflare) feature. It provides the same "pre-execution" blocking benefits but works on any server environment since the blocking happens in the cloud.
While every website's security needs are unique, here is a general guide to get you started. For a deep dive into every feature, please consult our Comprehensive Feature Guide.
Security > Dashboard > System Status to whitelist your IP and your server's IP. Then, enable logging.Security > Settings > IP Detection and add your CDN's ASN (e.g., AS13335 for Cloudflare) to the "Trusted Proxies" list. This is critical for accurate IP detection.AbuseIPDB is a global, crowdsourced project that tracks and reports malicious IP addresses in real-time. Our new integration allows the plugin to check the reputation of a new, unknown visitor against this database on their first visit. If the IP has been recently reported by others for activities like hacking, spam, or brute-force attacks, and its "abuse confidence score" is above your configured threshold, the plugin will block it instantly. This acts as a proactive shield against known bad actors, stopping them before they even have a chance to test your defenses. You can enable it and add your free API key under Security > Settings > Threat Intelligence.
This is an advanced security feature that checks if visitors claiming to be from major search engines (like Googlebot) are legitimate. It performs a DNS lookup to verify their IP address. If the check fails, the visitor is identified as an "impersonator" and receives a high threat score, preventing them from exploiting the trust given to real crawlers. This feature is enabled by default under Settings > Core Protections.
This is a critical security feature that prevents IP spoofing. If your site is behind a service like Cloudflare, Varnish, or another reverse proxy, the server's direct connection IP (REMOTE_ADDR) will always be the proxy's IP, not the visitor's. The real visitor IP is sent in an HTTP header (e.g., CF-Connecting-IP). An attacker can fake this header. The "Trusted Proxies" setting tells the plugin: "Only trust these headers if the request comes from an IP address I know is my proxy." You can add IPs, CIDR ranges, or ASNs (like AS13335 for Cloudflare) to this list under Security > Settings > IP Detection.
Geoblocking is a hard block. It shows a "403 Access Denied" page to visitors from selected countries.
Geo-Challenge is a soft block. It shows a quick, automated JavaScript test to visitors from selected countries. Legitimate humans pass instantly, while most bots are stopped. This is useful for regions you are suspicious of but do not want to block entirely. You can, for example, block Country A and challenge Country B. You can configure it in Security > Settings > Core Protections.
The JavaScript challenge (used by Geo-Challenge, Signature Engine, and Endpoint Lockdown) requires dynamic content. Aggressive page caching can interfere with it. If you experience issues (like a challenge loop or a "Verification failed" error), you must configure your caching plugin (e.g., WP Rocket, WP Fastest Cache, LiteSpeed Cache) to NOT cache pages for visitors who do not have the advaipbl_js_verified cookie. Most caching plugins have a setting like "Never cache pages that use this cookie."
Cookie consent plugins (like CookieYes) may block our security cookie from being set. To fix this, you must go into your cookie plugin's settings and classify the cookie named advaipbl_js_verified as "Strictly Necessary" or "Essential". This will allow the security challenge to function correctly.
For maximum performance, the plugin offers two ways to identify an IP's location (Security > Settings > Geolocation):
Security > Settings > Login & User Protection and enable 2FA globally. You can also enforce it for specific user roles.This is an advanced defense that stops botnets by blocking the attacker's "fingerprint" (signature), not just their IP. It works in three phases you can enable in Security > Settings > Signature Engine: Logging, Analysis (a background task that finds patterns), and Blocking (presents a JS challenge to malicious signatures). You can manage detected signatures in IP Management > Blocked Signatures.
Think of them as three layers of defense:
union select). It's fast and stops common, generic attacks./wp-admin/ THEN Block them permanently." It gives you the ultimate power to create a security policy tailored exactly to your site's needs.While every website's security needs are unique, here is a general guide to get you started based on your site's profile. For a deep dive into every feature, please consult our Comprehensive Feature Guide. 1. Essential First Steps (For ALL Websites) No matter your site type, do these three things immediately after installation to ensure a strong baseline security without locking yourself out:
Security > Dashboard > System Status and use the one-click buttons to add your current IP and your server's IP to the whitelist. This is the most critical step.Security > Blocking Rules, and in the "User Agents" and "Honeypot URLs" tabs, copy the suggested lists into the active blocklist text areas. This provides immediate protection from thousands of common bots.Security > Settings > General and ensure "Enable Logging" is turned on. This gives you the visibility you need to understand what is happening on your site.Settings > IP Trust & Threat Scoring).Settings > Core Protections and Threshold Blocking).Settings > Core Protections).
For an E-commerce or Membership Site (WooCommerce, etc.):
You need to protect your site while ensuring legitimate customers from around the world are never blocked.
Settings > Login & User Protection.
Security > Settings > IP Detection. Add the IPs or, even better, the ASNs of your CDN/proxy service to this list. For Cloudflare, simply add AS13335 on a new line. This is essential for the accuracy of all other security features.
This plugin includes an advanced "Edge Firewall Mode" that allows you to extend its protection to any PHP script on your server. This is perfect for securing custom applications or directories that are not managed by WordPress. To enable it, you need to add a single line of code to the beginning of the PHP file you want to protect. This manual step ensures that the protection is explicit and works on any server environment. For a complete step-by-step guide, please see our documentation: How to Protect Non-WordPress Folders.
HTTP Security Headers are instructions sent by your website to the visitor's browser. They tell the browser how to behave to prevent specific types of attacks.
Security > Settings > Security Headers.It allows you to create aggressive, targeted rules to block login attempts based on the username provided. For example, if you know you never use the username "admin", you can create a rule: IF Username IS "admin" THEN Block. This stops brute-force attacks instantly before they can even guess a password.
We improved our security compliance checks. The advaipbl-loader.php file is a special file designed to run outside of WordPress in "Edge Mode". We added a specific security check to ensure it can only be run via the auto_prepend_file mechanism and cannot be accessed directly by a browser, further hardening the plugin against probing.
undefined variable $block_reason_code) in the monitor_threat_score function, ensuring cleaner error logs.advaipbl-loader.php. Implemented a smart check to satisfy security scanners (Plugin Check) while maintaining Edge Mode compatibility..htaccess file. This blocks threats before WordPress loads, saving massive server resources. Includes automatic backups, proxy awareness (SetEnvIF), and support for Apache 2.2/2.4.wp-config.php, readme.html, etc.) at the server level.