[BlueOnyx:20653] Re: CSF / LFD?

abuse at sithost.ca abuse at sithost.ca
Tue Feb 14 10:54:45 -05 2017


Well I'll be damn'd... we actually have AFP but it was never turned on -smh-

Would this help with this?
Feb 13 20:17:09 vm3 sendmail[41726]: v1E2GxZ1041726: RANDOM COMPANY [XXX.XXX.XXX.XXX] (may be forged) did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA Feb 13 20:17:10 vm3 sendmail[41689]: v1E2Gvb3041689: RANDOM COMPANY [XXX.XXX.XXX.XXX] (may be forged) did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA Feb 13 20:17:11 vm3 sendmail[41674]: v1E2GvfY041674: RANDOM COMPANY [XXX.XXX.XXX.XXX] (may be forged) did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA Feb 13 20:17:11 vm3 sendmail[41730]: v1E2Gxip041730: RANDOM COMPANY [XXX.XXX.XXX.XXX] (may be forged) did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA Feb 13 20:17:12 vm3 sendmail[41735]: v1E2Gxv6041735: RANDOM COMPANY [XXX.XXX.XXX.XXX] (may be forged) did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA Feb 13 20:17:15 vm3 sendmail[41728]: v1E2Gx1C041728: RANDOM COMPANY [XXX.XXX.XXX.XXX] (may be forged) did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA Feb 13 20:17:16 vm3 sendmail[41749]: v1E2GxCN041749: RANDOM COMPANY [XXX.XXX.XXX.XXX] (may be forged) did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA Feb 13 20:17:17 vm3 sendmail[41773]: v1E2H0am041773: RANDOM COMPANY [XXX.XXX.XXX.XXX] (may be forged) did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA Feb 13 20:17:17 vm3 sendmail[41775]: v1E2H0xe041775: RANDOM COMPANY [XXX.XXX.XXX.XXX] (may be forged) did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA


Sean Chiarot| Web Technician
service at solutionsit.ca 



SolutionsIT
1810 Saskatchewan Avenue W
Portage La Prairie, Manitoba R1N 0N9
P. 1-204-325-1000 | F. 
www.solutionsit.ca | T. 1-866-325-7536
To reach our service desk, please call 1-866-325-7536 -----Original Message-----
From: Blueonyx [mailto:blueonyx-bounces at mail.blueonyx.it] On Behalf Of Michael Stauber
Sent: Monday, February 13, 2017 5:18 PM
To: BlueOnyx General Mailing List <blueonyx at mail.blueonyx.it>
Subject: [BlueOnyx:20652] Re: CSF / LFD?

Hi,

> Lately we've been getting hammered early in the morning when no one is 
> awake to stop these attacks, we've got another server running cPanel 
> and on that server we have CSF running 
> https://configserver.com/cp/csf.html this also runs a LFD (Login 
> Failure Daemon).. we are wondering if BlueOnyx has anything similar

Yes, we do.

Firewall:

http://shop.blueonyx.it/catalogsearch/result/?q=apf

Brute force login detector that ties into APF but also works stand alone:

http://shop.blueonyx.it/dfix-2.html

--
With best regards

Michael Stauber
_______________________________________________
Blueonyx mailing list
Blueonyx at mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx






More information about the Blueonyx mailing list