Hi guys!
I checked my /usr/local/psa/admin/logs/httpsd_access_log today and saw that for many months there is access to the login page each few seconds. Mostly by the same IPs. So I guess they are trying to brute force my password. In this log file I only see the GET data, so I don't know which passwords they try (passwords are transmitted via POST data). Is there an other log file where I can see all successful logins that I can check if anything serious happened?
And how do I prevent such IPs to brute force my password? For example it would be cool if I could ban all IPs automatically which tried five times with a wrong password to login.
Thx!
I checked my /usr/local/psa/admin/logs/httpsd_access_log today and saw that for many months there is access to the login page each few seconds. Mostly by the same IPs. So I guess they are trying to brute force my password. In this log file I only see the GET data, so I don't know which passwords they try (passwords are transmitted via POST data). Is there an other log file where I can see all successful logins that I can check if anything serious happened?
And how do I prevent such IPs to brute force my password? For example it would be cool if I could ban all IPs automatically which tried five times with a wrong password to login.
Thx!