I Want To Block IP Address Of Ddos Like Behavior
Oct 18, 2009Like exceeding 60 connections per minute same IP = automatically blocked.
How do I set it up?
Like exceeding 60 connections per minute same IP = automatically blocked.
How do I set it up?
i have problem when using ddos deflate for ddos protection in my server,
i get this message,
Quote:
Banned the following ip addresses on Tue Aug 4 13:12:37 WIT 2009
67.21.44.60 with 4011 connections
ddos deflate is blocking my server ip, what's wrong?
: 67.21.44.60 not real my server ip just for sample
I use deflate to prevent ddos attack.
But after I start deflate, I still keep seeing a lot of connection from certain IP.
netstat -ntu | awk '{print $5}' | cut -d: -f1 | sort | uniq -c | sort -n
87 218.86.252.158
363 219.150.191.62
501 60.216.238.212
I want to block those IPs permanently.
How can I do that.
My server is under DDOS attack. Its getting more than 1000 SYN_RECV requests. Please let me know how can I protect my server from it.
View 7 Replies View Relatedhow can i know the list of IP that is block by APF and anti-dos?
View 2 Replies View RelatedI have blocked this IP 125.115.144.28
/etc/apf/apf -d 125.115.144.28
But
netstat -anp|grep tcp|awk '{print $5}'| cut -d : -f1 | sort | uniq -c | sort -n
It still showing
202 125.115.144.28
Why?
Is it supposed to blocked right away, or need some time to get blocked.
When I checked /etc/apf/deny_hosts.rules
The IP is in the file.
sometimes, some people may try to guess the password of ssh,whm,ftp,...etc,
or any ddos attack,
do you only use iptables to place this problem?
or do you install any other scripts to secure your server?
my serve is centso.
I am receiving around 7.000 emails from different sources with the subject “Undelivered Mail Returned to Sender” or similar.
It seems someone is using an alias to my email address to send huge amounts of spam. I have checked the mail queue in WHM and the emails are not there. I have turned on the SMTP Tweak in security center, but that doesn’t seem to work.
I have no idea if this person is using my server to send massive amounts of spam,
What I have noticed is that most emails return to msxf@mydomain.com so is there a way to block this?
I manage a website which runs on the cpanel/whm interface and was wondering if there was anything my host could do to prevent DoS attacks on the server...at the moment we are having huge DoS attacks on our website therefore taking the whole website down for quite long periods of time.
My host just seems to be manually blocking the DoS'ers IP's manually but this is just too tedious and not efficient enough.
Is there any program for example that he can install which will block andy ip which sends a certain amount of requests within a given time period?
i have been receiving email logs stating that i have massive amounts of traffic being directed at my web server. these logs come in intervals of 1 minute (due to my settings) and they have between 150 - 300 connections each time. strange thing is, these attacks never have an ip, so nothing is blocked.
heres a sample of a log:
Banned the following ip addresses on Fri Mar 7 18:09:03 SGT 2008
170 with 170 connections
and another:
Banned the following ip addresses on Fri Mar 7 18:07:01 SGT 2008
171 with 171 connections
i'm quite sick of my server being put under such heavy stress. btw, this isnt brute forcing just to make sure right? its just heavy access on port 80?
I have configured qmail+spamassassin. It working find but still I have 2 problem. I am receiving spam mails from my own account to my own account e.g. from=info@domain.com to info@domain.com. How can I block this spam?
View 2 Replies View Relatedone user trying to send GET command to our server , when I viewing Apache Status in WHM I found about 100 connection from one IP (requestet none page only show GET / HTTP/1.0) , is this DDOS attack?
View 14 Replies View RelatedI checked on /server-status and it has tons of
ClientVHostRequest
{serverip } defaultGET / HTTP/1.0
However, the default web page is blank. Now my site has been DDoSed for the last 3 days. Does this mean they are attacking the site from the IP, because I do see many genuine access to the correct Vhost but no body should access the site via the IP.
Especially... why is the client, my on server ip that accesses?
I'm trying to use spamfilter to block mail from specific address, adding this e-mail to spamfilter in mail account settings, but it doesn't work. In logs I see:
spamc[13430]: skipped message, greater than max message size (256000 bytes).
Using FreeBSD 6. These 2 lines in /etc/rc.conf resulted in not able to boot:
firewall_enable="NO"
firewall_logging="YES"
The second rule had to be comment out otherwise it wouldn't boot. I started with "firewall_enable="NO"" because I locked myself out for other reasons, so I wanted to try it step by step this time.
Is the rule wrong or is logging without an enabled firewall the problem?
I'm not going to out the provider before I hear their explanation of it, but I've just had a very unnerving experience with a VPS provider.
Last night my server was experiencing latency issues, but I thought nothing of it until the server went down. I thought the network went down, but it appears that the server went down for emergency maintenance. That's fine, but it would have been nice if they alerted me of it. It went back down an hour later, so I sent my provider an email asking why I could not access my server and if they were aware of the problem.
I receive a response from someone asking for my root password and that they would take a look (he is referring to the latency issue I mentioned, but I was still completely unable to access the server at this poihnt, so I could have cared less about latency -- I just wanted the server up!). I explained the server was still down and asked if he knew anything about it, and this is when he told me about emergency maintenance that had to be done on the server. I also asked if he could ping my server (wondering if it was just a problem on my side), and he responded that he could if he "unpaused the server". He then asked me again to send my root password to diagnose the pinging issue. I think nothing of this email and went to sleep, expecting the issue to be fixed in the morning.
I wake up this morning and my server is still down, but now it's apparent that the host is fine, so I shoot back another email asking why my server has been paused. Fast forward 3 hours, I get a reply with him telling me that I was evasive about giving my password -- I would have gladly given a temporary root password, but I wasn't about to send over my regular password in cleartext over email. This is the part that really bothers me. He then told me that he looked around the files on my server to see if I were hiding anything. I cannot understand how me not giving my root password means I am hiding something. My server was down -- I couldn't change my root password to give to them since they had it paused. If I were abusing bandwidth, I could understand.
All this just because I didn't give him my root password? Am I in the wrong?
I have the latest whm/cpanel version installed.
I also have assp deluxe installed.
Here's my problem: I have a client that is having problems with his emails account. When someone sends him a mail from Brinkster.com, a rebound error is received:
Quote:
This is the Postfix program at host mta7.brinkster.com.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to <postmaster>
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The Postfix program
<ramy@kellyetcie.com>: kellyetcie.com
This only happens to that specific client. I tried sending a brinkster email to another account on the server, and it works fine. The problem only happens with that specific client..
it's come under my attention that dragonara.net has been ddosing me today since morning from the ip:
194.8.75.229
What's so ironic about it is that the ip is from a UK DDOS protection site so i'm expecting some email with their services in the next hour or so. Stay clear of them they are fakes and e-terrorists.
My customer has an external facing Apache server that is acting as a reverse proxy to two internal applications. They have:
- external addresses for each app which resolve to different ip addresses, so app1.their_domain.com and app2.their_domain.com resolve to 77.3.170.10 and 77.3.170.11 respectively.
- the Apache server has two network interfaces with ip addresses 192.168.10.10 and 192.168.10.11
- the external ip addresses resolve to the above internal addresses
- the firewall between the Apache server and the internal app servers is configured to allow traffic from 192.168.10.10 to reach app_server1, and traffic from 192.168.10.11 to reach app_server2, both using port 7777.
I have configured a virtual host in httpd.conf for each ip, i.e.
Code:
<VirtualHost 192.168.10.10:80>
...
ProxyPass /app http://app_server1:7777/app
ProxyPassReverse /app http://app_server1:7777/app
RewriteRule ^/$ /app/app1 [R,L]
...
<VirtualHost>
and
Code:
<VirtualHost 192.168.10.11:80>
...
ProxyPass /app http://app_server2:7777/app
ProxyPassReverse /app http://app_server2:7777/app
RewriteRule ^/$ /app/app2 [R,L]
...
<VirtualHost>
This works fine in that the external address are being routed to the correct application, however the firewall is blocking requests to the second app as it appears the requests are coming from the Apache servers 'primary' ip address 192.168.10.10 instead of 192.168.10.11.
Is it possible to send requests using the ip address from the relevant VirtualHost?
Windows server 2008
Apache 2.2
I am using virtuozzo firewall to secure access.
I enter 58.27.175.211/255.255.255.0 for Source Address and Netmask for port 22.
But still I can connect using 58.181.103.217 or 58.27.151.120.
Second is it possible to enter two different ip address in source address?
I just bought a new ip address and want to setup this new ip as my server's main ip, making the 'existing main ip' as the secondary ip.
Which means, this new ip will be the server's default ip address for all services, including when connecting to other server.
I'm using CentOs 4.5 and swsoft's panels: HSPcomplete & Virtuozzo Power Panel, and Webmin.
I want to redirect a website to a particular URL so that the address bar shows the same URL and not the destination URL. I know it is possible via URL masking, however, I want it in such a way that whenever somebody clicks on any link in the website, the address bar should still show the original URL. To put it in simple words, Suppose I want to redirect [url] to [url]. Now if there is a link named contact/index.htm and somebody clicks on it the address bar should display [url]and not redirect to [url]
How can it be possible using URL Rewrite method in .htaccess file?
The problem usually goes like this:
- I can't access the webserver
- I'll try to restart httpd, and I'll get
Starting httpd: (98)Address already in use: make_sock: could not bind to address [::]:443
To fix this, I run
[root@www1 ~]# lsof -i tcp:443
COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME
perl 11307 apache 4u IPv6 476943447 TCP *:https (LISTEN)
There is always leftover process that is causing the restart to fail. Once i force kill the process, I am able to restart httpd properly.
Now it is ok if this just occurs once in a while, but this problem keeps repeating itself almost everyday at 4am server time (cron time?). What can I do to permanently fix this?
I am looking for some good ddos protection providers, via protected dns. I've searched on internet, but most of them are really expensive.
Please tell me some ddos protection providers what could help me.(gige is too expensive btw).
And I found some ddos protection scripts. How can a script protected a server from ddos? A sript like CSF or DDoS deflate?
I am curious, what is the best way to ban certain IP from accessing server? I have software firewall (APF) and there is, of course, /etc/hosts.deny.
Which is the most efficient? I've read that software firewall becomes unstable after so many entries. Does the same apply to /etc/hosts.deny file?
Or is there a better way altogether?
some Chinese forums hotlinking images from my site and I even delete those images they keep sending me huge amount of http requests to my hosting server and eating 800mb of memory and upto 1GB cause server crash
I tried to block incoming referrer traffic from those sites using htaccess but it didn't work , I still see their http request on my server logs and memory keep goes high , am not sure my code is the right
how can I block these http request from these domains , what is the right htaccess code , I use DirectAdmin panel by the way
Can any one let me know how to block a range IP on SSH?
Eg: i'd like to block all IP: 67.63.123.xxx