Suddenly hit from lots of different places today.
-
-
-
@DustinB3403 said in Suddenly hit from lots of different places today.:
Looks like I need to install ipset on CentOS6, and I should be able to block by country then, yay!
-
Is there really much of a point geo blocking when it's usually hacked bots that are hammering on our servers?
-
@Mike-Davis said in Suddenly hit from lots of different places today.:
Is there really much of a point geo blocking when it's usually hacked bots that are hammering on our servers?
And when geo-detection is so poor. Nearly everything that I do in Texas shows up as Ontario, Canada. Literally everything that I use identifies me as being in Canada.
-
The splintering of IPv4 space has definitely wreaked havoc on geo assessing.
-
In Soviet Russia, IP address blocks you!
-
@scottalanmiller said in Suddenly hit from lots of different places today.:
@Mike-Davis said in Suddenly hit from lots of different places today.:
Is there really much of a point geo blocking when it's usually hacked bots that are hammering on our servers?
And when geo-detection is so poor. Nearly everything that I do in Texas shows up as Ontario, Canada. Literally everything that I use identifies me as being in Canada.
That's fucked up - I always get Michigan!
-
@RojoLoco said in Suddenly hit from lots of different places today.:
In Soviet Russia, IP address blocks you!
How'd you know it's the Russians?
-
@travisdh1 said in Suddenly hit from lots of different places today.:
@RojoLoco said in Suddenly hit from lots of different places today.:
In Soviet Russia, IP address blocks you!
How'd you know it's the Russians?
Who just happened to start at 8:21AM EST...... cluestick anybody?
-
We use ConfigServer Firewall/ CSF on all our servers (CentOS7 now, previously was on CentOS6)
Its a Stateful Packet Inspection (SPI) firewall, Login/Intrusion Detection and Security application for Linux servers. It is based on IP tables and very well block a decent level of attacks. Our CSF logs regularly blocks (first temporarily for some time and then if attack/invalid connection attempt continues then permenant block) and we get notified.
Few details from an email i received today!
109.111.112.178 (AD/Andorra/mx2.andorsoft.ad) blocked for port scanning
Time: Wed Nov 9 20:56:53 2016 +0400
IP: 109.111.112.178 (AD/Andorra/mx2.andorsoft.ad)
Hits: 11
Blocked: Temporary Block22.117.160.65 (TW/Taiwan/122-117-160-65.HINET-IP.hinet.net) blocked for port scanning
Time: Wed Nov 9 18:53:12 2016 +0400
IP: 122.117.160.65 (TW/Taiwan/122-117-160-65.HINET-IP.hinet.net)
Hits: 11
Blocked: Permanent BlockCSF has also option to block the entire country, however they warn that using country-level filtering will negatively impact performance and you will notice slower response times on your websites. This is due to the sheer size of the CIDR range lists (the list for the U.S. is 621K in plain text and contains more than 37,000 entries) and the fact that the firewall must check each incoming IP address against the chosen list(s).
Another feature i really like is the option to perform a basic security, stability and settings. A sample screenshot of a server check. Green ones are ok the the pink ones to be fixed.
https://i.imgur.com/XyqiBmx.png
On the latest version it even has an option to send scheduled reports on this security check as new versions could have more checks.
-
@travisdh1 said in Suddenly hit from lots of different places today.:
@RojoLoco said in Suddenly hit from lots of different places today.:
In Soviet Russia, IP address blocks you!
How'd you know it's the Russians?
Because you said
@travisdh1 said in Suddenly hit from lots of different places today.:
8:45AM 31.8.66.206 User:demo
8:45AM 46.33.250.164 User:demoLooking like Ukraine and Russia for the most part.
Plus that joke wouldn't work if the attackers were in Alsace-Lorraine or Burkina Faso.
-
@Ambarishrh I saw that, doesn't really give me anything beyond what cPHulk is doing already. Might have to try it on some local systems tho.
-
I'd just K-Line the whole /16 subnet and be done with it and see if that slows it down.
-
-
@MattSpeller said in Suddenly hit from lots of different places today.:
@dafyre said in Suddenly hit from lots of different places today.:
I'd just K-Line
I suspect that you may be unaware of the meaning that phrase has elsewhere lol
Wow. That's just sad. Guess I'll be expecting a visit from the FBI or NSA in a bit.
K-LINE is an old school IRC terminology. Was helping my old man with his IRC server today, lol.
K-LINE = block it forever... (on a Linux box, just use iptables, it's far, far easier).
-
@dafyre said in Suddenly hit from lots of different places today.:
I'd just K-Line the whole /16 subnet and be done with it and see if that slows it down.
That's what I've been doing with cphulk. The number of different systems being used is a little crazy. At this point I'm just wondering if I'll ever be able to prove anything, even tho I'm almost certain it's a government agency behind it.
Example of cPHulk email:
Block the IANA Netblock and call it done.
-
@travisdh1 said in Suddenly hit from lots of different places today.:
@Ambarishrh I saw that, doesn't really give me anything beyond what cPHulk is doing already. Might have to try it on some local systems tho.
cPHulk uses a MySQL database that does not use iptables in the manner CSF is using. It is more intensive to block using cPHulk due to the fact it blocks based on logging authentications to a MySQL database and then determining actions based on it. It is actually more streamlined and easier to manage CSF / LFD due to it dealing directly with iptables via flat files.
-
@Ambarishrh said in Suddenly hit from lots of different places today.:
@travisdh1 said in Suddenly hit from lots of different places today.:
@Ambarishrh I saw that, doesn't really give me anything beyond what cPHulk is doing already. Might have to try it on some local systems tho.
cPHulk uses a MySQL database that does not use iptables in the manner CSF is using. It is more intensive to block using cPHulk due to the fact it blocks based on logging authentications to a MySQL database and then determining actions based on it. It is actually more streamlined and easier to manage CSF / LFD due to it dealing directly with iptables via flat files.
I grep that. I have been keeping an eye on performance, and we haven't seen any detrimental effects yet (the memory cache for the mysql instance is ~2x the db size currently.)
-
For those interested in such things