Thank you for your detailed message and for doing the homework on what's available in Admin Tools.
To answer your questions directly:
1. Is there a configuration option in Admin Tools Professional for Joomla 6 that blocks an IP after failed logins?
No. Admin Tools does not currently have a built-in mechanism to track failed Joomla administrator login attempts and auto-block the originating IP. The Auto-ban feature in Admin Tools works from its own Blocked Requests Log (WAF violations, honeypot hits, etc.), not from Joomla's authentication failures. The "Deactivate users on failed login" hardening option also requires the username to exist on the site, so it does not help against the kind of username-cycling attack you described.
Nicholas told me he has thought about adding this feature, and the reason it has not reached the product yet is that tracking failed logins for usernames that do not exist on the site carries a significant risk of false positives. Users frequently mistype their username, conflate their username with their email address, or are not sure which of their three usual usernames they used on a given site. Blocking their IP in those cases would be worse than useless — it would create support tickets. He may add this as an option with a prominent warning about this behaviour in the future.
Another feature Nicholas has in mind is the ability to block logins using "forbidden" usernames. This was part of a two-pronged concept: disallowing registration of forbidden usernames (already implemented), and disallowing login to the site using those usernames (not yet implemented). This will come.
However, and regardless of these future changes, if an attacker follows a "spray" strategy — using a large number of IPs in a credentials stuffing attack — these features will not fully protect you. They will still see blocked requests because there are simply too many IPs involved. You cannot stop that. You have no control over what other people do. Your control is on your site, and that control comes from making credentials stuffing fail, not from trying to block every attacker at the network level.
2. Is this provided by Akeeba LoginGuard or another product?
Akeeba LoginGuard as a standalone product no longer exists. Its features were contributed into Joomla itself starting with Joomla 4.2. Joomla's native Multi-factor Authentication is Akeeba LoginGuard — under a different name. This is covered in point 3 below.
3. What is the currently recommended configuration?
Our recommendation is a layered approach:
Frontline defense: Administrator Password Protection — This is the primary defence layer. It requires a pre-shared password in addition to the standard Joomla credentials, making it extremely hard for automated tools to even attempt login.
Backup: Administrator Secret URL Parameter — You are already planning to enable this. It hides the administrator login URL behind a secret path, effectively removing the login page from public visibility.
Last line of defense: Multi-factor Authentication (MFA) — The Akeeba LoginGuard suite was contributed into Joomla 4.2+ as the native Multi-factor Authentication system. We strongly recommend enabling MFA on all administrator accounts. We are also preparing a companion plugin that will allow you to disable password-based logins entirely for accounts with two or more passkeys configured — passkeys provide the strongest possible authentication.
While MFA and passkeys will not stop attackers from trying to log in, they guarantee that they will fail to gain access. Hiding the door (via Secret URL) is useful, but making the door's lock virtually unpickable is what truly matters.
If you'd like an immediate fix for the current attack, you can add the attacking IP (216.107.136.107) to the Manual IP Deny List (Admin Tools → WAF Configuration → Manual IP Deny List). This will block it right away, though it does not scale for future dynamic IPs.
Nicholas K. Dionysopoulos
Lead Developer and Director
🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!