aaPanel_Jose

thank you Jose for the answer.

What about this line?

<div class="copyright">Copyright © 2014-2099 <a href="http://www.bt.cn" target="_blank">{{data['lan']['BT']}}</a>{{data['lan']['PS1']}}(<a href="http://www.bt.cn" target="_blank">www.bt.cn</a>) All Rights Reserved</div>

{{data ['lan'] ['BT']}} < / a> {{data ['lan'] ['PS1']}}

    CQT
    This is a front-end template for python, is there any problem?

    7 days later

    On some level, we need to find out why these servers are being attacked like this. I have one that I fired up today's ago, not shut down my OVH because of the non-stop attacks.

    So what are the footprints that are being targeted? Why are they going so hard after this panel. I had Virtualmin on this before this, no problem for years. Now with aapanel, in two days it gets shut down by my provider. I can't even get to it to move the websites. :-(
    https://www.screencast.com/t/RJKx0s31

      I want to point out as well, people talk about Block at cloudflare etc, that only works against a domain, not an IP address. So if it's the IP and not the domain they are attacking, you are screwed.

        gacott BWT, the footprint is NOT the port, because I change that right away.

        • CQT likes this.

        It's a shame, these sites and IPs have been up and working fine for years, now completely reached, can't even keep an IP up. Attacks from China, Hong Kong, and Africa. To the ip, so no way to stop them at cloud flare.

        • CQT replied to this.
        • CQT likes this.

          aaPanel_Jose we have about 3800 attacks and 122 Ips in a week from which the attacks are carried out. it definitely has something to do with bt.cn. Before that, we also used Openscoure Panels and it was just about 20 or 30 attacks. Since we removed aaPanel and only ran it for the test, the whole thing has normalized again to about 30 attacks.

          This only from yesterday until today 9:00 pm and today 8:40 am

          Total banned26
          Total failed18459
          Currently banned25
          Currently failed6

          Attacks take place on Dovecot, Ostfix, FTP, and web server (NGINX). Although Fail2ban, SYS Firewall and some security measures are still active. Just like CDN etc. These are not normal scans, but definitive attacks on the panel. As already said, only on aaPanel. The modules are hosted at bt.cn and conclusions can be drawn about the IPS of the installed panels. We even took the IPs from other data centers so that these IPs could not be attacked explicitly. Even in other countries not Germany or Europe and yet only aaPanel web servers are attacked. I had the same thing in 2017 at http://centos-webpanel.com/ since the attacks came from Croatia, Russia, China and Serbia. We quickly deleted it and it calmed down again. Since then we have avoided this panel. In my opinion, the modules should be reloaded via a proxy server, as should the installation. We are currently testing this and are already seeing some serious differences. So you have to consider where the modules are stored, on which servers, should you switch your own proxy server between? !!! Here would be the solution to install a local proxy first and then load and install aaPanel.

          gacott This is mostly done from China via VPN servers, hence from Africa

            aaPanel_Jose Yeah man. As I said, this IP has had Virtualmin on it forever. I decided to move it over, two days later, getting blasted like crazy. So much so that they shut me down. I then went to Cloudflare and created rules on the domains there, then unblocked the block they had placed on the IP. It was shut down again within 30 seconds.

            kaz050457 Certainly getting bruteforced is normal, we run 300+ VPSs ourselves. I have been doing this for years, and in years only the mail servers have been hit like this in the past. This is the first time ever for me to have my IP shutdown on a webserver. And no, I don't have the mailserver installed on this.

            kaz050457 No it is by no means normal !!

            Attacks would normally be 40-100 but not 1000 over a period of several hours.

            When we switched the proxy upstream with new IPS, it was just zero attacks. This shows that the IP is tracked and then attacked !!!!!!!!! Since it was then no longer possible to stretch the IPs via the installation

              CQT are guys using the default port? Do your server still support TLS 1.0 and TLS 1.1?