Using cURL to test WordPress Brute Force Login Blocks

Using this handy cURL command to see if blocks we are adding to prevent DDoS scans are working.

curl -L -A "Mozilla/5.0 (iPhone; U; CPU iPhone OS 4_3_3 like Mac OS X; en-us) AppleWebKit/533.17.9 (KHTML, like Gecko) Version/5.0.2 Mobile/8J2 Safari/6533.18.5" -c cookie.txt -X POST

-L = follow redirects
-A = user agent string
-c = cookie file
-X = request method