That may explain it then. Brute force was their term, not mine. So I assumed it was repeated login attempts and perhaps an issue with my settings. Having tested it myself though, the lockout seems to be functioning. That seems to make the DOS component likely and also explains the server maxing its memory/cpu resources.
I’m not super savvy on what protections they have in place. I may not be explaining this the best. When I say they took my account offline, I believe it was my hosting company that did it, because the site was being attacked. I do not believe the hacker took the whole server down in the DOS attack, they saw it happening and either the server deactivated the account or they did it manually to prevent continued attempts at gaining access.
When I spoke to the tech they said it seems to be a trending thing lately on wordpress installations. They were recommending another login limiting plugin. That’s where my confusion started, having had S2member already set up to block brute force attacks. I almost wonder if because S2member doesn’t deny access to the wp-login as part of the lockout that the hackers brute force attack may have turned into a DOS as a side effect. He started his brute force script, and was locked out immediately, but since the form is still available for user/pw combos and the script was still running, it became a DOS by default. Then my hosting company took the site offline as some sort of safeguard.
I’ve added a captcha math question to the login form which should prevent both from occurring in the future, but I may call support up again tomorrow to get more details. What questions do you recommend I ask? Should I be asking about the safeguards they have in place for brute force as well as denial of service?
Thanks for the help, by the way,
Rich