Our brute force block by IP address is extremely long lifecycle and detection. That's where we get the "slow-rolling" attacks from IPs that will try an account -wait a day, try another one, etc.
On our servers, you get 5 chances across 5 days -- and then that IP gets locked at our firewall. We have a web-form if a user can't get in and we go from there to restore their access. The number of hacks we've caught this way (especially someone trying to break into an account using stolen data) has been very successful. The users have been very understanding when it is explained this is for security purposes - it's better to get inadvertently locked out than to leave things "looser" and just let it rip...
Brute Force by Email Address is much looser and has a shorter lifecycle. We rarely if ever see an account fall to this one.
Legit logins won't trigger the IP detector - only bad ones - and bad ones won't hardly ever come from legit users because they save their passwords - like 99% of the time... The only time our legit users have had an issue is if they change their passwords but don't manage to update their devices. Our web-form also facilitates them alerting us for these situations so we can resolve.
MailEnable survivor / convert --