The file xmlrpc.php used by Wordpress and some other CMS systems is a common attack vector for hackers to try and exploit.
Due to the severe amount of traffic we see to this file across all sites and the amount of sites that get hacked because of it, we have started blocking access to this file across all our servers.
Over 90% of our client do not use this service and by blocking it, it also means that performance on our servers remain at a high level as the server does not have to deal with thousands of hackers requests all day.
As a result, some clients may find problems when using plugins like JetPack and others that rely on this file.
If you are using Wordpress, you can use the following plugin to get around the issue http://wordpress.org/extend/plugins/rename-xml-rpc/
If you have any problems or questions relating to this issue, please email support@elive.net and we will be happy to assist.
Most Popular Articles
Setting up Hosting for domain registered elsewhere
If you have registered your Domain name with a third party, but would like to have the email...
Adding an SSL Cert to your domain
If you want to have your website run under HTTPS (SSL, Encrypted Traffic) ,you will be a...
Control Panel Access
Your control panel can be accessed by going to https://<your_domain>:8443 or using the link...
Difference between Free and Paid SSL Certificates
An SSL Certificate is essential for your website these days. It shows your customers you are...
Installing a Free Lets Encrypt SSL Cert
Lets Encrypt SSL Certificates will secure your website and present a "Padlock' in the browser to...