<?xml version="1.0" encoding="UTF-8"?><rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
> <channel><title>Comments on: Blatant dewlance.com SEO, thrustvps, and HEAD attacks</title> <atom:link href="https://bogdan.org.ua/2010/11/06/blatant-dewlance-seo-thrustvps-and-head-attacks.html/feed" rel="self" type="application/rss+xml" /><link>https://bogdan.org.ua/2010/11/06/blatant-dewlance-seo-thrustvps-and-head-attacks.html</link> <description>Tiny bits of bioinformatics, [web-]programming etc</description> <lastBuildDate>Mon, 01 Jan 2024 17:12:20 +0000</lastBuildDate> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>https://wordpress.org/?v=3.8.27</generator> <item><title>By: Bogdan</title><link>https://bogdan.org.ua/2010/11/06/blatant-dewlance-seo-thrustvps-and-head-attacks.html#comment-120335</link> <dc:creator><![CDATA[Bogdan]]></dc:creator> <pubDate>Thu, 11 Nov 2010 10:59:27 +0000</pubDate> <guid
isPermaLink="false">http://bogdan.org.ua/?p=1189#comment-120335</guid> <description><![CDATA[Ok, I&#039;ve read your personal email to me and will update the post text to reflect your position.]]></description> <content:encoded><![CDATA[<p>Ok, I&#8217;ve read your personal email to me and will update the post text to reflect your position.</p> ]]></content:encoded> </item> <item><title>By: Kunnu Singh</title><link>https://bogdan.org.ua/2010/11/06/blatant-dewlance-seo-thrustvps-and-head-attacks.html#comment-120320</link> <dc:creator><![CDATA[Kunnu Singh]]></dc:creator> <pubDate>Thu, 11 Nov 2010 05:49:38 +0000</pubDate> <guid
isPermaLink="false">http://bogdan.org.ua/?p=1189#comment-120320</guid> <description><![CDATA[I don&#039;t know why its use my domain name in referrer but this client is trying hack my server.
I get a lots of failed login alert on my WHM and Gmail(password reset email)
I have a some old log entries
Log entries:
IP REMOVED - root [07/11/2010:03:26:19 -0000] &quot;POST /login/ HTTP/1.1&quot; FAILED LOGIN whostmgrd: user password incorrect
IP REMOVED -      [07/11/2010:03:26:37 -0000] &quot;POST /login/ HTTP/1.1&quot; FAILED LOGIN whostmgrd: user name not specified or invalid user
IP REMOVED - root [07/11/2010:03:27:09 -0000] &quot;POST /login/ HTTP/1.1&quot; FAILED LOGIN whostmgrd: user password incorrect
IP REMOVED - root [07/11/2010:03:27:25 -0000] &quot;POST /login/ HTTP/1.1&quot; FAILED LOGIN whostmgrd: user password incorrect
IP REMOVED - root [07/11/2010:03:27:34 -0000] &quot;POST /login/ HTTP/1.1&quot; FAILED LOGIN whostmgrd: user password incorrect
This person is Trying to reset my Gmail password:
I get this email on my personal email account: &quot;Google Password Assistance&quot;]]></description> <content:encoded><![CDATA[<p>I don&#8217;t know why its use my domain name in referrer but this client is trying hack my server.</p><p>I get a lots of failed login alert on my WHM and Gmail(password reset email)</p><p>I have a some old log entries<br
/> Log entries:</p><p>IP REMOVED &#8211; root [07/11/2010:03:26:19 -0000] &#8220;POST /login/ HTTP/1.1&#8243; FAILED LOGIN whostmgrd: user password incorrect<br
/> IP REMOVED &#8211;      [07/11/2010:03:26:37 -0000] &#8220;POST /login/ HTTP/1.1&#8243; FAILED LOGIN whostmgrd: user name not specified or invalid user<br
/> IP REMOVED &#8211; root [07/11/2010:03:27:09 -0000] &#8220;POST /login/ HTTP/1.1&#8243; FAILED LOGIN whostmgrd: user password incorrect<br
/> IP REMOVED &#8211; root [07/11/2010:03:27:25 -0000] &#8220;POST /login/ HTTP/1.1&#8243; FAILED LOGIN whostmgrd: user password incorrect<br
/> IP REMOVED &#8211; root [07/11/2010:03:27:34 -0000] &#8220;POST /login/ HTTP/1.1&#8243; FAILED LOGIN whostmgrd: user password incorrect</p><p>This person is Trying to reset my Gmail password:<br
/> I get this email on my personal email account: &#8220;Google Password Assistance&#8221;</p> ]]></content:encoded> </item> <item><title>By: Bogdan</title><link>https://bogdan.org.ua/2010/11/06/blatant-dewlance-seo-thrustvps-and-head-attacks.html#comment-120289</link> <dc:creator><![CDATA[Bogdan]]></dc:creator> <pubDate>Wed, 10 Nov 2010 23:18:41 +0000</pubDate> <guid
isPermaLink="false">http://bogdan.org.ua/?p=1189#comment-120289</guid> <description><![CDATA[Dear Kunnu Singh, I know it&#039;s hard to monitor for outgoing attacks, and I am inclined to believe that it was just a malicious client.
There is one thing I do not understand, though: is that referrer string added automatically to all outgoing HTTP requests? How is that possible?]]></description> <content:encoded><![CDATA[<p>Dear Kunnu Singh, I know it&#8217;s hard to monitor for outgoing attacks, and I am inclined to believe that it was just a malicious client.</p><p>There is one thing I do not understand, though: is that referrer string added automatically to all outgoing HTTP requests? How is that possible?</p> ]]></content:encoded> </item> <item><title>By: Kunnu Singh</title><link>https://bogdan.org.ua/2010/11/06/blatant-dewlance-seo-thrustvps-and-head-attacks.html#comment-120237</link> <dc:creator><![CDATA[Kunnu Singh]]></dc:creator> <pubDate>Wed, 10 Nov 2010 05:55:08 +0000</pubDate> <guid
isPermaLink="false">http://bogdan.org.ua/?p=1189#comment-120237</guid> <description><![CDATA[Sorry for Inconvenience, Also I get attacks from some IPs but all area blocked by my Firewall(CSF)
Please Install this software on your VPS:
1. CSF
2. Mod Security
and use suPHP
Install Instruction: http://configserver.com/free/csf/install.txt
MOD Security: http://www.modsecurity.org/
CSF inform me if someone try to send lots of comments on my blog, try to login, etc.
We&#039;re not doing any illegal works for getting visitors.
I spend money on Advertisements then why I want to block my Site in search engine for spamming.
If you need any help then please contact me]]></description> <content:encoded><![CDATA[<p>Sorry for Inconvenience, Also I get attacks from some IPs but all area blocked by my Firewall(CSF)</p><p>Please Install this software on your VPS:<br
/> 1. CSF<br
/> 2. Mod Security<br
/> and use suPHP</p><p>Install Instruction: <a
href="http://configserver.com/free/csf/install.txt" rel="nofollow">http://configserver.com/free/csf/install.txt</a></p><p>MOD Security: <a
href="http://www.modsecurity.org/" rel="nofollow">http://www.modsecurity.org/</a></p><p>CSF inform me if someone try to send lots of comments on my blog, try to login, etc.</p><p>We&#8217;re not doing any illegal works for getting visitors.<br
/> I spend money on Advertisements then why I want to block my Site in search engine for spamming.</p><p>If you need any help then please contact me</p> ]]></content:encoded> </item> <item><title>By: Kunnu Singh</title><link>https://bogdan.org.ua/2010/11/06/blatant-dewlance-seo-thrustvps-and-head-attacks.html#comment-120235</link> <dc:creator><![CDATA[Kunnu Singh]]></dc:creator> <pubDate>Wed, 10 Nov 2010 05:45:30 +0000</pubDate> <guid
isPermaLink="false">http://bogdan.org.ua/?p=1189#comment-120235</guid> <description><![CDATA[I can&#039;t monitor my client accounts because of Windows not provide any monitor software or tool.
But Client account has been removed.]]></description> <content:encoded><![CDATA[<p>I can&#8217;t monitor my client accounts because of Windows not provide any monitor software or tool.</p><p>But Client account has been removed.</p> ]]></content:encoded> </item> <item><title>By: Bogdan</title><link>https://bogdan.org.ua/2010/11/06/blatant-dewlance-seo-thrustvps-and-head-attacks.html#comment-120189</link> <dc:creator><![CDATA[Bogdan]]></dc:creator> <pubDate>Tue, 09 Nov 2010 17:20:33 +0000</pubDate> <guid
isPermaLink="false">http://bogdan.org.ua/?p=1189#comment-120189</guid> <description><![CDATA[Bob - I&#039;ve posted fail2ban rules, if you still see those spikes.]]></description> <content:encoded><![CDATA[<p>Bob &#8211; I&#8217;ve posted fail2ban rules, if you still see those spikes.</p> ]]></content:encoded> </item> <item><title>By: Bogdan</title><link>https://bogdan.org.ua/2010/11/06/blatant-dewlance-seo-thrustvps-and-head-attacks.html#comment-119989</link> <dc:creator><![CDATA[Bogdan]]></dc:creator> <pubDate>Sun, 07 Nov 2010 19:44:04 +0000</pubDate> <guid
isPermaLink="false">http://bogdan.org.ua/?p=1189#comment-119989</guid> <description><![CDATA[I have just sent a complaint to ThrustVPS abuse address, including 1.7MB log file of all these requests since November 4.
While waiting for their response I&#039;ll write a fail2ban rule with a day-long bantime against this type of requests. I think limiting to 10 HEAD requests every 10 seconds from a single IP is OK.
When/if those fail2ban rules are ready, I may as well post them here.]]></description> <content:encoded><![CDATA[<p>I have just sent a complaint to ThrustVPS abuse address, including 1.7MB log file of all these requests since November 4.</p><p>While waiting for their response I&#8217;ll write a fail2ban rule with a day-long bantime against this type of requests. I think limiting to 10 HEAD requests every 10 seconds from a single IP is OK.</p><p>When/if those fail2ban rules are ready, I may as well post them here.</p> ]]></content:encoded> </item> <item><title>By: Bob Meetin</title><link>https://bogdan.org.ua/2010/11/06/blatant-dewlance-seo-thrustvps-and-head-attacks.html#comment-119948</link> <dc:creator><![CDATA[Bob Meetin]]></dc:creator> <pubDate>Sun, 07 Nov 2010 14:43:45 +0000</pubDate> <guid
isPermaLink="false">http://bogdan.org.ua/?p=1189#comment-119948</guid> <description><![CDATA[I have been investigating similar load average spikes which have become regular this week, several times a day. I implemented a simple monitoring script a week back that sends me an email if the load average spikes above a defined threshhold. Yesterday I got the provider to install a snapshot utility. It took the combination of both to identify the same offender as you found.
Undoubtedly I can add the IP to a no access list. I&#039;m just curious what action you took, aside from filing a complaint?]]></description> <content:encoded><![CDATA[<p>I have been investigating similar load average spikes which have become regular this week, several times a day. I implemented a simple monitoring script a week back that sends me an email if the load average spikes above a defined threshhold. Yesterday I got the provider to install a snapshot utility. It took the combination of both to identify the same offender as you found.</p><p>Undoubtedly I can add the IP to a no access list. I&#8217;m just curious what action you took, aside from filing a complaint?</p> ]]></content:encoded> </item> </channel> </rss>