IPv6 bruteforce prevention
-
During the last days I’ve been receiving IPv6 traffic exclusively trying to guess passwords. Thousands of tries. Big time. I’ve noticed all entries into the login_failed table being registered, they’re also being displayed on the login attempts page, but I can’t add them to blacklists since the script is validating the IP and, since it isn’t detecting an IPv4 address, it isn’t allowing me to add it.
I did everything: disabled IPv6 support on CloudFlare, disabled IPv6 support on my server, and I’m still getting this guy trying. So I opted for using the cpHulk utility on my WHM interface to properly add the IPv6 address to the server’s blacklist. But that’s not a solution since login attempts are not at service level.
I strongly suggest you to do a tiny modification on your code so we users can add IPv6 addresses to the blacklists, or there will be, evantually, many, many users getting smart hackers using methods like this to gain access to the blog.
- The topic ‘IPv6 bruteforce prevention’ is closed to new replies.