Chris1
Regular Pleskian
Hello,
I have a custom jail set up to match the following:
This does work however it seems that when it is running on a server with ~300 domains it struggles to ban IP's efficiently.
Log path is set to:
A warning appears in the Fail2Ban section that states:
As the "*" would be making it scan ~300 log files, is there a more efficient way of scanning for Wordpress login attempts?
Even though I have it set to 5 attempts before being banned, it can sometimes take up to 30-60 minutes to ban the offending IP even if they are brute forcing with an attempt every second.
Kind regards,
Chris
I have a custom jail set up to match the following:
Code:
failregex = <HOST>.*] "POST /wp-login.php
This does work however it seems that when it is running on a server with ~300 domains it struggles to ban IP's efficiently.
Log path is set to:
Code:
logpath = /var/www/vhosts/system/*/logs/access_log
A warning appears in the Fail2Ban section that states:
Code:
Warning: Fail2Ban might not work well if there are many domains and Fail2Ban has to monitor too many log files.
As the "*" would be making it scan ~300 log files, is there a more efficient way of scanning for Wordpress login attempts?
Even though I have it set to 5 attempts before being banned, it can sometimes take up to 30-60 minutes to ban the offending IP even if they are brute forcing with an attempt every second.
Kind regards,
Chris