Please whitelist cPanel in your adblocker so that you’re able to see our version release promotions, thanks!

The Community Forums

Interact with an entire community of cPanel & WHM users!

Brute force attacks question

Discussion in 'Security' started by Gaffcain, Aug 25, 2016.

Tags:
  1. Gaffcain

    Gaffcain Registered

    Joined:
    Aug 25, 2016
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    1
    Location:
    Scotland
    cPanel Access Level:
    Root Administrator
    Hello,
    I'm new here and I've had a look around but could really find an answer.

    Yesterday I installed a brand new copy of cpanel and within an hour my server started getting attacked with brute force attempts.

    I've changed all the passwords just to be sure, but how is it possible for it to happen that quick of a brand new server being installed?

    Is there anything I can do to stop the attempts?

    Thanks for your time.

    -Gareth
     
  2. cPanelMichael

    cPanelMichael Technical Support Community Manager
    Staff Member

    Joined:
    Apr 11, 2011
    Messages:
    44,802
    Likes Received:
    1,896
    Trophy Points:
    363
    cPanel Access Level:
    Root Administrator
    Twitter:
    Hello,

    It's common for to see bots that scan IP ranges looking for server's that accept connections over common ports. The following documents should help you get started with securing the server:

    Recommended Security Settings - cPanel Knowledge Base - cPanel Documentation
    How to Secure SSH - cPanel Knowledge Base - cPanel Documentation
    Tips to Make Your Server More Secure - cPanel Knowledge Base - cPanel Documentation
    cPHulk Brute Force Protection - Documentation - cPanel Documentation

    Thank you.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
Loading...

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice