The Community Forums

Interact with an entire community of cPanel & WHM users!
  1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Recent increase in users blocked by CPHulk

Discussion in 'General Discussion' started by fugtruck, Jul 19, 2012.

  1. fugtruck

    fugtruck Member

    Joined:
    Apr 27, 2010
    Messages:
    21
    Likes Received:
    0
    Trophy Points:
    1
    Within the past two or three weeks, we have noticed a major increase in the number of our users being blocked by cPHulk for failed login attempts across many of our cPanel servers. Looking at the cphulkd log files, we see that the IP address that the failed login attempts are coming from are indeed the IP addresses that the users in question are actually connecting from.

    Now, if it were just one person here or there that this is happening to, I would not think anything about it. But the number of users we are having locked out is very abnormal. For example, I don't know I have had more than one or two end users in the past year locked out by cPHulk, but now we are having several users per day complaining.

    Is anyone else experiencing this?
     
  2. cPanelMichael

    cPanelMichael Forums Analyst
    Staff Member

    Joined:
    Apr 11, 2011
    Messages:
    30,762
    Likes Received:
    662
    Trophy Points:
    113
    cPanel Access Level:
    Root Administrator
    Hello :)

    I have not seen any recent reports regarding false positives for cPHulk. It should only be logging the failed login attempts. Have you verified if the login attempts have actually failed, or that it's reported a failed login attempt incorrectly?

    You may want to submit a ticket so we can investigate further:

    Submit A Ticket

    Thank you.
     
  3. Infopro

    Infopro cPanel Sr. Product Evangelist
    Staff Member

    Joined:
    May 20, 2003
    Messages:
    14,461
    Likes Received:
    195
    Trophy Points:
    63
    Location:
    Pennsylvania
    cPanel Access Level:
    Root Administrator
    Twitter:
Loading...

Share This Page