Hello,
I would like to set up brute force protection for applications such as Wordpress.
I am currently using ConfigServer Security & Firewall - csf v8.16.
In Fail2Ban on Plesk, you can just set up a regex trigger in the domains access log directory such as:
I notice that similar logs in cPanel can be found in /home/*/access-logs/*.
How can LFD be leveraged to ban multiple login failures or does LFD do this by default for applications such as Wordpress?
Edit: I was thinking I could add /home/*/access-logs/* to the "lfd Log Scanner Files" list, but what LFD consider to be a "login failure"? How does it determine this?
I would like to set up brute force protection for applications such as Wordpress.
I am currently using ConfigServer Security & Firewall - csf v8.16.
In Fail2Ban on Plesk, you can just set up a regex trigger in the domains access log directory such as:
Code:
failregex = <HOST>.*\] \"POST .*\/wp-login.php
How can LFD be leveraged to ban multiple login failures or does LFD do this by default for applications such as Wordpress?
Edit: I was thinking I could add /home/*/access-logs/* to the "lfd Log Scanner Files" list, but what LFD consider to be a "login failure"? How does it determine this?
Last edited: