Stopping Outgoing BruteForce Attacks
Posted: 06 Jul 2021, 06:09
Hello, i have an dedicated bare metal server with Hetzner but everyday I'm getting emails for outgoing bruteforce and portscan attacks.
My server is a shared hosting server, we're selling shared and reseller hosting through the server and server have almost 900+ cPanel Accounts.
So how can i find out which account is sending outgoing bruteforce attack and how can i stop it ?
I am mentioning some logs which hetzner sent me :
Is there anyway to stop it via CSF ?
My server is a shared hosting server, we're selling shared and reseller hosting through the server and server have almost 900+ cPanel Accounts.
So how can i find out which account is sending outgoing bruteforce attack and how can i stop it ?
I am mentioning some logs which hetzner sent me :
Code: Select all
> ------------------------------------------
> MYSERVERIP - - [14/Jun/2021:06:04:17 +0200] "POST /wp-login.php HTTP/1.0" 200 1494 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
> MYSERVERIP - - [14/Jun/2021:06:04:20 +0200] "POST /xmlrpc.php HTTP/1.0" 403 212 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
> MYSERVERIP - - [14/Jun/2021:06:25:26 +0200] "GET /wp-login.php HTTP/1.0" 200 2388 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
> MYSERVERIP - - [14/Jun/2021:06:25:27 +0200] "POST /wp-login.php HTTP/1.0" 200 2527 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
> MYSERVERIP - - [14/Jun/2021:06:25:28 +0200] "POST /xmlrpc.php HTTP/1.0" 403 212 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
> MYSERVERIP - - [14/Jun/2021:06:32:23 +0200] "GET /wp-login.php HTTP/1.0" 200 2388 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"