• Please be aware: Kaspersky Anti-Virus has been deprecated
    With the upgrade to Plesk Obsidian 18.0.64, "Kaspersky Anti-Virus for Servers" will be automatically removed from the servers it is installed on. We recommend that you migrate to Sophos Anti-Virus for Servers.
  • The Horde webmail has been deprecated. Its complete removal is scheduled for April 2025. For details and recommended actions, see the Feature and Deprecation Plan.
  • We’re working on enhancing the Monitoring feature in Plesk, and we could really use your expertise! If you’re open to sharing your experiences with server and website monitoring or providing feedback, we’d love to have a one-hour online meeting with you.

Some 'nice' messages in the log

markcarsonboxz

New Pleskian
I like to keep an eye on things on the server, particularly log files.

In the /usr/local/psa/admin/logs/httpsd_access_log file in my installation, I have 1000s of the following:

172.xx.xxx.xx xxx.xxx.xxx.xxx:8443 - [16/Aug/2010:23:37:49 +0100] "GET /login_up.php3?login_name=admin&passwd=george HTTP/1.1" 303 0 "-" "the beast"
172.xx.xxx.xx xxx.xxx.xxx.xxx:8443 - [16/Aug/2010:23:40:22 +0100] "GET /login_up.php3?login_name=admin&passwd=guest HTTP/1.1" 303 0 "-" "the beast"

I'm not particularly concerned that there is an effort to attempt to brute-force the admin password for Plesk, since it seems there is one attempt every 3 minutes. My password is not in any dictionary as I have made a determined attempt at producing a very strong password that takes around 5mins for me to calculate using an equation.

Anyway, if in about 500 years, the beast gets my password, it will undoubtedly discover that his ip cannot get in (at least I hope so)

It is just annoying that, no matter how much is done to prevent this kind of hacking attempt, it just keeps re-appearing! Is there anything I can do to prevent this current attempt?

(I am planning the upgrade of Plesk to 9.5.2)


_____________
Edit: 24 hours later with Plesk updated to 9.5.2, some additional iptables rules and modifications to sysctl and the attacks are still occurring; now with random passwords...

Is there anyone with any ideas as to how to at least find out the source ip, so this can be blocked at least to stop the log size increasing and with my recent changes to ossec, more emails...?

My VPS provider does not provide the facility within iptables to use LOG!!?? for whatever reason. I am researching other methods.
 
Last edited:
Back
Top