Β 
The Joomla Training Cohort has been launched!

Please send any feedback or bug reports to [email protected] (opens new link)  

Even though you are using Joomla , attack bots looking for WordPress vulnerabilities are still trying to hack your web hosting account. These can be simply removed from the equation by redirecting them to a dummy page. That's what this Maintenance Monday takes a look at.

 

 

 

00:00 - Handling WordPress Bot Attacks on Joomla Sites with 404 Redirects
12:45 - Managing Bot Attacks on Joomla: Redirects and Tracking Techniques
17:39 - Q&A on Joomla Redirect Strategies: Combining Multiple Rules

 

Summary

  1. Introduction to the Issue: WordPress attack bots can affect Joomla sites by generating 404 errors, which use up server resources and distort site analytics.

  2. Why It Matters: These bots target WordPress-specific URLs like wp-login.php, but Joomla sites with broken URL tracking tools and Google Analytics could still register these bot requests.

  3. Problem of 404 Errors: Each bot request triggers a 404 error, which is logged and can clutter your database, slow down the site, and skew analytics.

  4. Solution Overview: The solution involves redirecting bot requests for WordPress-specific URLs to a blank HTML file, bypassing Joomla's processing of these requests.

  5. Creating a Blank HTML Page: In the Joomla root directory, create a simple HTML file (e.g., no-thanks.html) to serve as the redirect destination. This file doesn’t need to contain content as bots will not see it.

  6. Editing .htaccess File: Modify the .htaccess file to add a rewrite rule. This rule catches requests for WordPress URLs (e.g., wp-login.php) and redirects them to the blank HTML file.

  7. Rewrite Rule Details: The rewrite rule redirects any URL containing wp-login or similar WordPress URLs (like wp-admin) to the no-thanks.html page, using a 301 permanent redirect.

  8. Testing the Redirect: After saving the .htaccess file, test the redirect by visiting the targeted WordPress URLs. The bot requests should immediately redirect to the blank page, preventing the creation of 404 errors.

  9. Additional Redirect Rules: To block more WordPress bot attacks, create additional redirect rules for other WordPress-related URLs (e.g., wp-admin, wp-includes).

  10. Other Options: For users not using sh404sef, the Joomla core redirect component can also be used to set up these redirects without the need for .htaccess file edits.

This method helps maintain Joomla site performance and keeps analytics and URL tracking clean from unnecessary bot activity.

Please send any feedback or bug reports or queries to;

Contact Tim Davis β–Ί This email address is being protected from spambots. You need JavaScript enabled to view it.

Joomla Training Cohort β–Ί https://cybersalt.com/jtc

JTC has been launched and is now accepting members https://cybersalt.com/services/subscriptions
mySites.guru β–Ί https://mysites.guru
Backing Up Your Joomla Site with Akeeba β–Ίhttps://www.youtube.com/watch?v=4Xu4o0g2-RY&t=0s
FOLLOW US ON X(TWITTER!) β–Ί https://x.com/basicjoomla
LIKE US ON FACEBOOK! β–Ί https://www.facebook.com/basicjoomla
SUBSCRIBE US ON YOUTUBE β–Ί//www.youtube.com/@Basicjoomla

#basicjoomla

#cybersalt

Monday Maintenance 014


Interesting blog? Like it on Facebook, Post it or share this article on other bookmarking websites.

Written by:
Tim Davis is the founder and owner of Cybersalt.
Log in to comment

Add comment

Submit