{"id":5,"date":"2008-04-12T15:55:01","date_gmt":"2008-04-12T13:55:01","guid":{"rendered":"http:\/\/danger.rulez.sk\/?page_id=5"},"modified":"2017-09-02T13:58:24","modified_gmt":"2017-09-02T11:58:24","slug":"bruteforceblocker","status":"publish","type":"page","link":"https:\/\/danger.rulez.sk\/index.php\/bruteforceblocker\/","title":{"rendered":"BruteForceBlocker"},"content":{"rendered":"<p>BruteForceBlocker is a perl script, that works along with <a href=\"http:\/\/www.openbsd.org\/faq\/pf\/index.html\" target=\"_blank\" rel=\"noopener\">pf<\/a> &#8211; firewall developed by <a href=\"http:\/\/www.openbsd.org\/\" target=\"_blank\" rel=\"noopener\">OpenBSD<\/a> team (Which is also available on <a href=\"http:\/\/www.freebsd.org\/\" target=\"_blank\" rel=\"noopener\">FreeBSD<\/a> since version 5.2 is out).<\/p>\n<blockquote><p><strong><em>Its main purpose is to block SSH bruteforce attacks via firewall.<\/em><\/strong><\/p><\/blockquote>\n<p>When this script is running, it checks sshd logs from syslog and looks for Failed Login attempts &#8211; mostly some annoying script attacks, and counts number of such attempts.<\/p>\n<p>When the given IP reaches configured limit of fails, script puts this IP to the pf&#8217;s table and block any further traffic to the that box from the given IP (This also depends on your configuration in pf.conf).<\/p>\n<p>Since the version of BruteForceBlocker 1.2 it is also possible to report blocked IPs to the project site and share your information with other users. <strong>The list of reported IPs is available <a href=\"https:\/\/danger.rulez.sk\/projects\/bruteforceblocker\/blist.php\">here<\/a>.<\/strong><\/p>\n<p>If you are bored of those automated auth tries, you will be happy with this script. BruteForceBlocker is easy to use, simple, and effective.<\/p>\n<p>Git repository is available at <a href=\"https:\/\/github.com\/dgerzo\/bruteforceblocker\">https:\/\/github.com\/dgerzo\/bruteforceblocker<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>BruteForceBlocker is a perl script, that works along with pf &#8211; firewall developed by OpenBSD team (Which is also available on FreeBSD since version 5.2 is out). Its main purpose is to block SSH bruteforce attacks via firewall. When this script is running, it checks sshd logs from syslog and looks for Failed Login attempts [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-5","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/danger.rulez.sk\/index.php\/wp-json\/wp\/v2\/pages\/5","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/danger.rulez.sk\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/danger.rulez.sk\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/danger.rulez.sk\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/danger.rulez.sk\/index.php\/wp-json\/wp\/v2\/comments?post=5"}],"version-history":[{"count":1,"href":"https:\/\/danger.rulez.sk\/index.php\/wp-json\/wp\/v2\/pages\/5\/revisions"}],"predecessor-version":[{"id":107,"href":"https:\/\/danger.rulez.sk\/index.php\/wp-json\/wp\/v2\/pages\/5\/revisions\/107"}],"wp:attachment":[{"href":"https:\/\/danger.rulez.sk\/index.php\/wp-json\/wp\/v2\/media?parent=5"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}