i want removed all ip that are in firewall rules in csf/cpanel
Chain SPAMHAUS (1 references)
num pkts bytes target prot opt in out source destination
1 0 0 DROP all -- * * 91.146.64.0/18 0.0.0.0/0
2 0 0 DROP all -- * * 91.146.112.0/20 0.0.0.0/0
3 0 0 DROP all -- * * 89.35.0.0/23 0.0.0.0/0
4 0 0 DROP all -- * * 89.32.203.0/24 0.0.0.0/0
5 0 0 DROP all -- * * 89.233.64.0/18 0.0.0.0/0
6 0 0 DROP all -- * * 89.208.122.0/23 0.0.0.0/0
7 0 0 DROP all -- * * 89.187.192.0/19 0.0.0.0/0
8 0 0 DROP all -- * * 89.145.128.0/20 0.0.0.0/0
9 0 0 DROP all -- * * 88.206.80.0/20 0.0.0.0/0
10 0 0 DROP all -- * * 88.206.8.0/21 0.0.0.0/0
11 0 0 DROP all -- * * 88.206.64.0/20 0.0.0.0/0
12 0 0 DROP all -- * * 88.206.0.0/17 0.0.0.0/0
13 0 0 DROP all -- * * 88.206.0.0/21 0.0.0.0/0
14 0 0 DROP all -- * * 86.59.160.0/19 0.0.0.0/0
15 0 0 DROP all -- * * 86.59.128.0/17 0.0.0.0/0
16 0 0 DROP all -- * * 86.111.128.0/19 0.0.0.0/0
17 0 0 DROP all -- * * 86.105.230.0/24 0.0.0.0/0
18 539 37022 DROP all -- * * 85.255.112.0/20 0.0.0.0/0
19 0 0 DROP all -- * * 83.223.240.0/22 0.0.0.0/0
20 0 0 DROP all -- * * 83.223.224.0/19 0.0.0.0/0
21 0 0 DROP all -- * * 81.95.144.0/20 0.0.0.0/0
22 0 0 DROP all -- * * 81.29.240.0/20 0.0.0.0/0
23 0 0 DROP all -- * * 81.17.16.0/20 0.0.0.0/0
24 0 0 DROP all -- * * 78.95.128.0/20 0.0.0.0/0
25 0 0 DROP all -- * * 72.21.128.0/20 0.0.0.0/0
26 0 0 DROP all -- * * 69.8.176.0/20 0.0.0.0/0
27 393 27185 DROP all -- * * 69.50.160.0/19 0.0.0.0/0
28 0 0 DROP all -- * * 69.50.16.0/20 0.0.0.0/0
29 0 0 DROP all -- * * 66.55.160.0/19 0.0.0.0/0
30 0 0 DROP all -- * * 66.37.112.0/20 0.0.0.0/0
31 0 0 DROP all -- * * 66.185.112.0/20 0.0.0.0/0
32 0 0 DROP all -- * * 66.102.32.0/20 0.0.0.0/0
33 0 0 DROP all -- * * 65.255.32.0/20 0.0.0.0/0
34 0 0 DROP all -- * * 64.28.176.0/20 0.0.0.0/0
35 0 0 DROP all -- * * 64.255.128.0/19 0.0.0.0/0
36 0 0 DROP all -- * * 63.246.32.0/20 0.0.0.0/0
37 0 0 DROP all -- * * 58.83.0.0/22 0.0.0.0/0
38 0 0 DROP all -- * * 58.65.238.0/23 0.0.0.0/0
39 0 0 DROP all -- * * 58.65.232.0/21 0.0.0.0/0
40 0 0 DROP all -- * * 217.69.112.0/20 0.0.0.0/0
I'll be life long grateful is some one can tell me how to allow only my IP address to access the whole vps server, to add ddos protection on it in the end.
I already try, but i'm a dummy already on linux interface.
Applying Plesk firewall changes? I make my change, apply and get to:
Status: Applying in progress. If your browser shows connection error messages, or if this screen does not disappear in more than 30 seconds, go to previous page.
And there things stay. Going back to look at the firewall I can see the change haven't been applied, and going to apply just results in the same. No error, just no anything. It also took numerous attempts to get firewall modification to be swtich on although finally at about the eighth attempt changes were enabled. Only now I can't apply them ...
I am using the plesk firewall and trying to set up SSH rule which only allows from my IP but deny from everywhere else. In previous versions this worked fine by adding an ip selecting Allow from selected sources, deny from others and the icon in the rules would be orange with the lines
allow incoming from xxx.xxx.xxx.xx Deny incoming from all others
However this no longer works as the deny from all others is not appearing and is not being generated in the iptables by plesk.
I just have installed plesk panel and when i get to the "Firewall" tool, then clicked on "Enable Firewall Rules Management", proftpd has stopped working properly.URLs....I have preinstalled the server 2 times, and every time i try to edit the firewall rules, proftpd got broken.
A client's server's password was guessed, and the hacker conveniently uninstalled perl. I can't seem to get perl reinstalled. Any ideas on how this would be done? RPM, TAR's and YUM don't work, as they require perl!
I accidently added a new domain to another domains webspace instead of a separate one. I removed the domain and readded it correctly.Ever since then the nightly web_statistics_executor.exe gives me the error
The system cannot find the path specified. (Error code 3) at Open file 'D:Inetpubvhostsdomain.co.uk. pleskstatisticsdomain2.co. ukwebstatCopy AWStats.lock'....
Any domain using a SSL certificate is switched to the default certificate after each Plesk update?This is starting to get annoying and we are disabling automatic updates due to this error...
in order to have a Horde admin email we open /etc/psa-webmail/horde/horde/conf.php
and change $conf['auth']['admins'] = array(); into $conf['auth']['admins'] = array('emailaddress@xyz.com');
Works fine. This change than reverses itself after every Plesk update incl micro updates. Are we editing the right file / is there an underlying one we should edit instead? Cannot find a setting in Plesk itself to configure a Horde admin email.
I purchased a Host license.Major customers in China. There is a facebook link in the panel.But China does not allow access facebook. This leads to a very slow access speed! Can I remove this link? If so, how to remove?
Do you recommend a software firewall when behind a hardware firewall?
All of our servers are behind Cisco ASA 5505 firewalls which we rent from Liquidweb. All are being managed correctly and setup to there optimal levels. With hardware firewalls firmly in place, do you still recommend a software firewall such as APF or IPTables (we're talking linux); in our opinion we see it as an extra administration overhead. If this is however untrue, we will change out thinking.
I've found a dedicated server at a great price and plan to stick with it, my first ( already have 2 vps accounts ). I don't have the money for a hardware firewall. However, I do have a chance to renew a Kerio WinRoute Firewall license from way back.
Does anyone think this would be better than the default windows 2003 firewall?
I signed up with Lunarpages a while back for a dedicated server for my business. Good price, managed hosting rocks, decent disk space... little problem once with a huge power outage, but **** happens, cool.
All is well until I wake up this morning to an email a minute about a failed cron job. It smells fishy, so I contact LUnar pages support to see whats up.
They inform me that some asswad had managed to brute force into my server using a temporary account I set up a while back for some tech support. (I prefaced this with 'im an idiot', so no you know why) Either way, my server now has a rootkit, plus other **** im sure im not aware of... so they propose to move me to a brand new fresh box. im thinking they are gonna charge me a fee for this, a fee for that... no way. All is free of charge.
Im ****ting kittens now.
so im resetting everything up, and i manage to look myself out of my database...(i told you I was an idiot.. and this was a looooong day already)
they fix it. again. no problem...
If you are looking for a dedicated server, go to lunarpages. otherwise you are a freaking idiot as far as I am concerned... Lunarpages, I love you, I want your babies...
PS: I am in no way affiliated with lunarpages... however, if they want to give me a free year on their servers, i wouldnt complain... *hint hint*
Any good secure rules for mod_security 2 that work well for shared servers?
Can someone share what rules you are using to secure your shared servers. Have tried a few different sets of rules, but a few customers always end up with errors and disabling it for their domain name doesn't sound like a safer option for them or the server.
how to create rules with ip/5hit/s is black list and auto ban ip with IPSec.
when test attack file .php info test : using code attack files. attack file test.php ( code files : <?php echo "we are test" ; ?> ) Ex : attack files test.php ( http://mydomain.php/test.php ) attack 200hit/s ( all files .php is not run ) php application is hang.
also wherewith code attack. i tested asp, html. it isn't problem. ( 1879hit/s ) ( good working)