I have several websites made in WordPress. WordPress try to update itself regularly. When it happens, I received an email from the server for every website of this type:
Apr 20 14:08:43 squirrel lfd : Messenger HTML Service died, restarted
Apr 20 14:08:43 squirrel lfd : Messenger TEXT Service died, restarted
Apr 20 14:08:43 squirrel lfd : *Error* cannot open server on port 8888: Address already in use, at line 213
Apr 20 14:08:43 squirrel lfd : *Error* cannot open server on port 8889: Address already in use, at line 213...
I also wonder if it's possible NOT to block permanent (could block temporary) when the country of an IP is mine (Canada) and a rule is triggered? This way, it would have way less impact on my customer that keeps forgetting their password.
I have MESSENGER html template working perfectly on 80, but can't make it work via HTTPS.
Tried this settings:
MESSENGER_HTTPS = 8887
MESSENGER_HTTPS_IN = 443,2083,2096 (also doesn't work when this is left empty)
Going to shows the block template, while timeouts.
I use latest CSF and latest cPanel 62.
I am trying to setup CSF on my VPS and love how powerful and versatile it is. I have been able to customize it a bit for my applications (Auto-bans, Wordpress logins, etc.), and it has been stopping a lot of naughty traffic thus far.
Although it is stopping all of these break in attempts, i am curious which users (or domains) generate the most hacking attempts. Would it be possible to...
The first set of lfd blocking statistics Blocks by lfd in last 24 hours and Block triggers in last 24 hours show stats from 11 days ago and not latest 24 hours. Yesterday showed same stats from March 2 (etc).. Other graphs are correct. Error confirmed by comparing with csf.deny file. Not critical but it is annoying.
Hi,
I been running my server without any issues for over a year now.
Starting a couple days ago I started receiving this: Excessive resource usage: rpcuser every hour out of no where.
I understand I can add this to the ignore list but I just wanted to see if anybody knows if this is some kind of hacking attempt or if the server may be compromised in any way.
I have a fully dedicated VPS with GoDaddy. The only thing they manage is the physical server the VPS resides on and ensure that my VPS is up...I am 100% responsible for all configurations, maintenance etc. I downloaded CSF and installed it and then ran the ./csftest.pl script to see what its doing, I get the following:
In my log file I have seen someone to brute a lot of vulns, there are over 256 entries, but they only try twice for each attack, then try another vuln.
However the string of
x=upload&mode=upload&upload=&ssp=RfVbHu&u=&action=upload&chdir=./&do=upload&pass=wcwc2016&login=go%21&H=
is always present.
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum