Hi all

I have been noting the following sequence in my nginx logs.

169.229.3.91 - - [06/Jul/2016:10:26:00 +0200] "\xF1)1\xB0\x0E\xD6\xCEOSb`\xE3E\x90\xE1A\xB3\x7F\x8C\x0B\x02\xBF\x05RN\xD0\x87\x8F%=\x83(\x16\x9A\xDF5\x1D\xC8\x81<\x80l\xC6\xD8\xCD9\xA0\xE9\xDF~\xCEC\xFB\xF0\xCB\xB5\xD2\x85I\xAAVT\x98F" 400 166 "-" "-"

A bit of searching led me to the following info about it:
https://www.abuseipdb.com/check/169.229.3.91

Nginx generates a 400 error as expected but I would like to be able to detect these attempts using Fail2Ban and ban it after X attempts. I would think the best place to add this would be in the nginx-botsearch.conf or botsearch-common.conf file but I am really not good with regex at all and will probably break Fail2Ban in the process.

Anyone have any idea on a regex string to deal with this? Important to note the string sent is all back slashes \ not the usual / used in url structures and they also pass lots of special characters in the string. I DID try myself and came up with this "^<HOST> \- \S+ \[.*] \"[\\]+.*
" but it does not work (my regex sucks)

Also very important to note is that Nginx records no GET, POST or HEAD either.

And here are some other one's I would also like to be able to detect and ban.

192.99.144.140 - - [08/Jul/2016:14:45:19 +0200] "*PROPFIND* /webdav/ HTTP/1.1" 301 178 "-" "WEBDAV Client" PORT:80 0.000 - . "-"

54.149.78.218 - - [08/Jul/2016:09:38:35 +0200] "*PRI ** HTTP/2.0" 400 166 "-" "-" PORT:80 5.005 - . "-"

Any help?

Kind Regards
Mitchell


------------------------------------------------------------------------------
Attend Shape: An AT&T Tech Expo July 15-16. Meet us at AT&T Park in San
Francisco, CA to explore cutting-edge tech and listen to tech luminaries
present their vision of the future. This family event has something for
everyone, including kids. Get more information and register today.
http://sdm.link/attshape
_______________________________________________
Fail2ban-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to