[BlueOnyx:20653] Re: CSF / LFD?
abuse at sithost.ca
abuse at sithost.ca
Tue Feb 14 10:54:45 -05 2017
Well I'll be damn'd... we actually have AFP but it was never turned on -smh-
Would this help with this?
Feb 13 20:17:09 vm3 sendmail[41726]: v1E2GxZ1041726: RANDOM COMPANY [XXX.XXX.XXX.XXX] (may be forged) did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA Feb 13 20:17:10 vm3 sendmail[41689]: v1E2Gvb3041689: RANDOM COMPANY [XXX.XXX.XXX.XXX] (may be forged) did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA Feb 13 20:17:11 vm3 sendmail[41674]: v1E2GvfY041674: RANDOM COMPANY [XXX.XXX.XXX.XXX] (may be forged) did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA Feb 13 20:17:11 vm3 sendmail[41730]: v1E2Gxip041730: RANDOM COMPANY [XXX.XXX.XXX.XXX] (may be forged) did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA Feb 13 20:17:12 vm3 sendmail[41735]: v1E2Gxv6041735: RANDOM COMPANY [XXX.XXX.XXX.XXX] (may be forged) did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA Feb 13 20:17:15 vm3 sendmail[41728]: v1E2Gx1C041728: RANDOM COMPANY [XXX.XXX.XXX.XXX] (may be forged) did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA Feb 13 20:17:16 vm3 sendmail[41749]: v1E2GxCN041749: RANDOM COMPANY [XXX.XXX.XXX.XXX] (may be forged) did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA Feb 13 20:17:17 vm3 sendmail[41773]: v1E2H0am041773: RANDOM COMPANY [XXX.XXX.XXX.XXX] (may be forged) did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA Feb 13 20:17:17 vm3 sendmail[41775]: v1E2H0xe041775: RANDOM COMPANY [XXX.XXX.XXX.XXX] (may be forged) did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA
Sean Chiarot| Web Technician
service at solutionsit.ca
SolutionsIT
1810 Saskatchewan Avenue W
Portage La Prairie, Manitoba R1N 0N9
P. 1-204-325-1000 | F.
www.solutionsit.ca | T. 1-866-325-7536
To reach our service desk, please call 1-866-325-7536 -----Original Message-----
From: Blueonyx [mailto:blueonyx-bounces at mail.blueonyx.it] On Behalf Of Michael Stauber
Sent: Monday, February 13, 2017 5:18 PM
To: BlueOnyx General Mailing List <blueonyx at mail.blueonyx.it>
Subject: [BlueOnyx:20652] Re: CSF / LFD?
Hi,
> Lately we've been getting hammered early in the morning when no one is
> awake to stop these attacks, we've got another server running cPanel
> and on that server we have CSF running
> https://configserver.com/cp/csf.html this also runs a LFD (Login
> Failure Daemon).. we are wondering if BlueOnyx has anything similar
Yes, we do.
Firewall:
http://shop.blueonyx.it/catalogsearch/result/?q=apf
Brute force login detector that ties into APF but also works stand alone:
http://shop.blueonyx.it/dfix-2.html
--
With best regards
Michael Stauber
_______________________________________________
Blueonyx mailing list
Blueonyx at mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx
More information about the Blueonyx
mailing list