To make Directadmin’s Brute Force Monitor work with CSF you should do the following:
The block_ip.sh is only used for an active “click” by the Admin, it does not automate blocking. Fetch the files:
1 2 3 4 5 |
cd /usr/local/directadmin/scripts/custom/ wget -O block_ip.sh http://files.plugins-da.net/dl/csf_block_ip.sh.txt wget -O unblock_ip.sh http://files.plugins-da.net/dl/csf_unblock_ip.sh.txt wget -O show_blocked_ips.sh http://files.plugins-da.net/dl/csf_show_blocked_ips.sh.txt chmod 700 block_ip.sh show_blocked_ips.sh unblock_ip.sh |
Create the empty block list and exempt list files:
1 2 |
touch /root/blocked_ips.txt touch /root/exempt_ips.txt |
To automate blocking, install the following script:
1 2 3 |
cd /usr/local/directadmin/scripts/custom wget -O brute_force_notice_ip.sh http://files.directadmin.com/services/all/brute_force_notice_ip.sh chmod 700 brute_force_notice_ip.sh |
Source:
http://forum.directadmin.com/showthread.php?t=44839&p=229244#post229244