Hi, >> Yes, I've implemented iptables to drop the attempts. I was really just >> curious if it was a specific attack with a known pattern so I could >> investigate further. fail2ban is great for things like this. >> > Do you have an example of the iptables entry which does the block? Yes, quite easy. Just doing it manually for now: # Create the LOGDROP chain iptables -N LOGDROP iptables -F LOGDROP iptables -A LOGDROP -j LOG --log-prefix "LOGDROP " iptables -A LOGDROP -j DROP iptables -j LOGDROP -I INPUT -s <offending_ip> -d <my_ip> -p tcp --dport 80 This will log each attempt to syslog, or just replace the LOGDROP in the last rule with DROP to avoid the logging. Best regards, Alex -- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines