ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Suddenly hit from lots of different places today.

    Scheduled Pinned Locked Moved IT Discussion
    securityhackbrute forceattack
    34 Posts 10 Posters 5.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DustinB3403D
      DustinB3403
      last edited by DustinB3403

      Here is what you'll want to do.

      And here will outline the reject functions.

      travisdh1T 1 Reply Last reply Reply Quote 0
      • DustinB3403D
        DustinB3403
        last edited by

        Here is yet another topic on this process as well.

        1 Reply Last reply Reply Quote 0
        • travisdh1T
          travisdh1 @DustinB3403
          last edited by

          @DustinB3403 said in Suddenly hit from lots of different places today.:

          Here is what you'll want to do.

          And here will outline the reject functions.

          Looks like I need to install ipset on CentOS6, and I should be able to block by country then, yay!

          1 Reply Last reply Reply Quote 0
          • Mike DavisM
            Mike Davis
            last edited by

            Is there really much of a point geo blocking when it's usually hacked bots that are hammering on our servers?

            scottalanmillerS 1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @Mike Davis
              last edited by

              @Mike-Davis said in Suddenly hit from lots of different places today.:

              Is there really much of a point geo blocking when it's usually hacked bots that are hammering on our servers?

              And when geo-detection is so poor. Nearly everything that I do in Texas shows up as Ontario, Canada. Literally everything that I use identifies me as being in Canada.

              MattSpellerM 1 Reply Last reply Reply Quote 1
              • DashrenderD
                Dashrender
                last edited by

                The splintering of IPv4 space has definitely wreaked havoc on geo assessing.

                1 Reply Last reply Reply Quote 1
                • RojoLocoR
                  RojoLoco
                  last edited by

                  In Soviet Russia, IP address blocks you!

                  travisdh1T 1 Reply Last reply Reply Quote 5
                  • MattSpellerM
                    MattSpeller @scottalanmiller
                    last edited by

                    @scottalanmiller said in Suddenly hit from lots of different places today.:

                    @Mike-Davis said in Suddenly hit from lots of different places today.:

                    Is there really much of a point geo blocking when it's usually hacked bots that are hammering on our servers?

                    And when geo-detection is so poor. Nearly everything that I do in Texas shows up as Ontario, Canada. Literally everything that I use identifies me as being in Canada.

                    That's fucked up - I always get Michigan!

                    1 Reply Last reply Reply Quote 0
                    • travisdh1T
                      travisdh1 @RojoLoco
                      last edited by

                      @RojoLoco said in Suddenly hit from lots of different places today.:

                      In Soviet Russia, IP address blocks you!

                      How'd you know it's the Russians?

                      travisdh1T RojoLocoR 2 Replies Last reply Reply Quote 0
                      • travisdh1T
                        travisdh1 @travisdh1
                        last edited by

                        @travisdh1 said in Suddenly hit from lots of different places today.:

                        @RojoLoco said in Suddenly hit from lots of different places today.:

                        In Soviet Russia, IP address blocks you!

                        How'd you know it's the Russians?

                        Who just happened to start at 8:21AM EST...... cluestick anybody?

                        1 Reply Last reply Reply Quote 0
                        • AmbarishrhA
                          Ambarishrh
                          last edited by Ambarishrh

                          We use ConfigServer Firewall/ CSF on all our servers (CentOS7 now, previously was on CentOS6)

                          Its a Stateful Packet Inspection (SPI) firewall, Login/Intrusion Detection and Security application for Linux servers. It is based on IP tables and very well block a decent level of attacks. Our CSF logs regularly blocks (first temporarily for some time and then if attack/invalid connection attempt continues then permenant block) and we get notified.

                          Few details from an email i received today! 🙂

                          109.111.112.178 (AD/Andorra/mx2.andorsoft.ad) blocked for port scanning
                          Time: Wed Nov 9 20:56:53 2016 +0400
                          IP: 109.111.112.178 (AD/Andorra/mx2.andorsoft.ad)
                          Hits: 11
                          Blocked: Temporary Block

                          22.117.160.65 (TW/Taiwan/122-117-160-65.HINET-IP.hinet.net) blocked for port scanning
                          Time: Wed Nov 9 18:53:12 2016 +0400
                          IP: 122.117.160.65 (TW/Taiwan/122-117-160-65.HINET-IP.hinet.net)
                          Hits: 11
                          Blocked: Permanent Block

                          CSF has also option to block the entire country, however they warn that using country-level filtering will negatively impact performance and you will notice slower response times on your websites. This is due to the sheer size of the CIDR range lists (the list for the U.S. is 621K in plain text and contains more than 37,000 entries) and the fact that the firewall must check each incoming IP address against the chosen list(s).

                          Another feature i really like is the option to perform a basic security, stability and settings. A sample screenshot of a server check. Green ones are ok the the pink ones to be fixed.

                          XyqiBmx.png

                          On the latest version it even has an option to send scheduled reports on this security check as new versions could have more checks.

                          travisdh1T 1 Reply Last reply Reply Quote 0
                          • RojoLocoR
                            RojoLoco @travisdh1
                            last edited by

                            @travisdh1 said in Suddenly hit from lots of different places today.:

                            @RojoLoco said in Suddenly hit from lots of different places today.:

                            In Soviet Russia, IP address blocks you!

                            How'd you know it's the Russians?

                            Because you said

                            @travisdh1 said in Suddenly hit from lots of different places today.:

                            8:45AM 31.8.66.206 User:demo
                            8:45AM 46.33.250.164 User:demo

                            Looking like Ukraine and Russia for the most part.

                            Plus that joke wouldn't work if the attackers were in Alsace-Lorraine or Burkina Faso.

                            1 Reply Last reply Reply Quote 1
                            • travisdh1T
                              travisdh1 @Ambarishrh
                              last edited by

                              @Ambarishrh I saw that, doesn't really give me anything beyond what cPHulk is doing already. Might have to try it on some local systems tho.

                              AmbarishrhA 1 Reply Last reply Reply Quote 0
                              • dafyreD
                                dafyre
                                last edited by

                                I'd just K-Line the whole /16 subnet and be done with it and see if that slows it down.

                                MattSpellerM travisdh1T 2 Replies Last reply Reply Quote 1
                                • MattSpellerM
                                  MattSpeller @dafyre
                                  last edited by

                                  @dafyre said in Suddenly hit from lots of different places today.:

                                  I'd just K-Line

                                  I suspect that you may be unaware of the meaning that phrase has elsewhere lol

                                  dafyreD 1 Reply Last reply Reply Quote 1
                                  • dafyreD
                                    dafyre @MattSpeller
                                    last edited by

                                    @MattSpeller said in Suddenly hit from lots of different places today.:

                                    @dafyre said in Suddenly hit from lots of different places today.:

                                    I'd just K-Line

                                    I suspect that you may be unaware of the meaning that phrase has elsewhere lol

                                    Wow. That's just sad. Guess I'll be expecting a visit from the FBI or NSA in a bit.

                                    K-LINE is an old school IRC terminology. Was helping my old man with his IRC server today, lol.

                                    K-LINE = block it forever... (on a Linux box, just use iptables, it's far, far easier).

                                    1 Reply Last reply Reply Quote 2
                                    • travisdh1T
                                      travisdh1 @dafyre
                                      last edited by

                                      @dafyre said in Suddenly hit from lots of different places today.:

                                      I'd just K-Line the whole /16 subnet and be done with it and see if that slows it down.

                                      That's what I've been doing with cphulk. The number of different systems being used is a little crazy. At this point I'm just wondering if I'll ever be able to prove anything, even tho I'm almost certain it's a government agency behind it.

                                      Example of cPHulk email:
                                      alt text

                                      Block the IANA Netblock and call it done.

                                      1 Reply Last reply Reply Quote 1
                                      • AmbarishrhA
                                        Ambarishrh @travisdh1
                                        last edited by

                                        @travisdh1 said in Suddenly hit from lots of different places today.:

                                        @Ambarishrh I saw that, doesn't really give me anything beyond what cPHulk is doing already. Might have to try it on some local systems tho.

                                        cPHulk uses a MySQL database that does not use iptables in the manner CSF is using. It is more intensive to block using cPHulk due to the fact it blocks based on logging authentications to a MySQL database and then determining actions based on it. It is actually more streamlined and easier to manage CSF / LFD due to it dealing directly with iptables via flat files.

                                        travisdh1T 1 Reply Last reply Reply Quote 1
                                        • travisdh1T
                                          travisdh1 @Ambarishrh
                                          last edited by

                                          @Ambarishrh said in Suddenly hit from lots of different places today.:

                                          @travisdh1 said in Suddenly hit from lots of different places today.:

                                          @Ambarishrh I saw that, doesn't really give me anything beyond what cPHulk is doing already. Might have to try it on some local systems tho.

                                          cPHulk uses a MySQL database that does not use iptables in the manner CSF is using. It is more intensive to block using cPHulk due to the fact it blocks based on logging authentications to a MySQL database and then determining actions based on it. It is actually more streamlined and easier to manage CSF / LFD due to it dealing directly with iptables via flat files.

                                          I grep that. I have been keeping an eye on performance, and we haven't seen any detrimental effects yet (the memory cache for the mysql instance is ~2x the db size currently.)

                                          1 Reply Last reply Reply Quote 0
                                          • travisdh1T
                                            travisdh1
                                            last edited by

                                            For those interested in such things

                                            0_1478721557353_upload-b18683f9-ac76-4b8a-ae2b-197d3b5dc645

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 1 / 2
                                            • First post
                                              Last post