Replies: 2 comments 4 replies
-
If you could post a section of your log file with some failed logins here that would be helpful. |
Beta Was this translation helpful? Give feedback.
-
Hello, I have a similar problem. I'm running nginx and want to filter by referrer via ipban. Here it is:
The regex should mask if we have a successful http status (2xx) and referrer is "-". Here a log snippet from nginx access.log:
The first should not be allowed to access, so the regex should fit to that. The nginx log format is standard one:
Tested with the recommended regex101 - works as expected. Debug is switched on in ipban nlog.config.
The whitelist ip rule does exist it the firewall, the logfile states "Updating global whitelist with 1 ip addressess". What could be the problem? Thanks! |
Beta Was this translation helpful? Give feedback.
-
hi,
i insert this Jellyfin Recipe into LogFilesToParse entry in ipban.override.config.
tried wrong user/password,ipban didnt ban me.
already checked:
1.my jellyfin default log path:C:/ProgramData/Jellyfin/Server/log/log_{year-local}{month-local}{day-local}.log
2.jellyfin's log looks ok,same pattern as recipe's.checked by regex101.com.
3.ipban.config: didnt change any setting.
log:
2021-04-27 17:57:06.2108|WARN|DigitalRuby.IPBanCore.Logger|Initializing service 2021-04-27 17:57:06.3261|WARN|DigitalRuby.IPBanCore.Logger|Detecting os version... 2021-04-27 17:57:06.4720|WARN|DigitalRuby.IPBanCore.Logger|OS version detected: Name: Windows, Version: 10.0.19042, Friendly Name: Microsoft Windows 10 Pro, Description: Microsoft Windows 10.0.19042, app version: 1.6.0 2021-04-27 17:57:06.5304|WARN|DigitalRuby.IPBanCore.Logger|Running as a Windows service 2021-04-27 17:57:06.7003|WARN|DigitalRuby.IPBanCore.Logger|Preparing to run service 2021-04-27 17:57:06.7351|WARN|DigitalRuby.IPBanCore.Logger|Starting service 2021-04-27 17:57:06.7351|WARN|DigitalRuby.IPBanCore.Logger|Running service 2021-04-27 17:57:07.6131|WARN|DigitalRuby.IPBanCore.Logger|IPBan is free software created and refined over many years. 2021-04-27 17:57:07.6131|WARN|DigitalRuby.IPBanCore.Logger|Please consider upgrading to the pro version for more advanced functions, shared ban lists and much more. 2021-04-27 17:57:07.6131|WARN|DigitalRuby.IPBanCore.Logger|Learn more at https://ipban.com 2021-04-27 17:57:07.6131|INFO|DigitalRuby.IPBanCore.Logger|Initializing IPBan database at Data Source=C:\Program Files\IPBan\ipban.sqlite 2021-04-27 17:57:08.2670|WARN|DigitalRuby.IPBanCore.Logger|IPBan service started and initialized 2021-04-27 17:57:08.2670|WARN|DigitalRuby.IPBanCore.Logger|Log levels: True,True,True,True,False,False 2021-04-27 17:57:10.0276|INFO|DigitalRuby.IPBanCore.Logger|Adding log file to parse: C:/Program Files/Microsoft/Exchange Server/*/TransportRoles/Logs/FrontEnd/ProtocolLog/**.log 2021-04-27 17:57:10.0276|INFO|DigitalRuby.IPBanCore.Logger|Adding log file to parse: C:/Program Files/Smarter Tools/Smarter Mail/**/*.log 2021-04-27 17:57:10.0276|INFO|DigitalRuby.IPBanCore.Logger|Adding log file to parse: C:/Program Files (x86)/Smarter Tools/Smarter Mail/**/*.log 2021-04-27 17:57:10.0276|INFO|DigitalRuby.IPBanCore.Logger|Adding log file to parse: C:/SmarterMail/logs/**/*.log 2021-04-27 17:57:10.0276|INFO|DigitalRuby.IPBanCore.Logger|Adding log file to parse: C:/Smarter Mail/logs/**/*.log 2021-04-27 17:57:10.0276|INFO|DigitalRuby.IPBanCore.Logger|Adding log file to parse: C:/Program Files (x86)/Mail Enable/Logging/SMTP/SMTP-Activity-*.log 2021-04-27 17:57:10.0276|INFO|DigitalRuby.IPBanCore.Logger|Adding log file to parse: C:/Program Files/Mail Enable/Logging/SMTP/SMTP-Activity-*.log 2021-04-27 17:57:10.0276|INFO|DigitalRuby.IPBanCore.Logger|Adding log file to parse: C:/Program Files/Tomcat/logs/**/*access_log*.txt 2021-04-27 17:57:10.0434|INFO|DigitalRuby.IPBanCore.Logger|Adding log file to parse: C:/IPBanCustomLogs/**/*.log 2021-04-27 17:57:10.1555|WARN|DigitalRuby.IPBanCore.Logger|Loaded firewall type DigitalRuby.IPBanCore.IPBanWindowsFirewall 2021-04-27 17:57:10.1930|WARN|DigitalRuby.IPBanCore.Logger|Syncing firewall and ipban.sqlite database... 2021-04-27 17:57:10.3805|WARN|DigitalRuby.IPBanCore.Logger|0 total ip addresses in the ipban.sqlite database 2021-04-27 17:57:10.4203|WARN|DigitalRuby.IPBanCore.Logger|Initialized event viewer with query string: <QueryList><Query Id='1' Path='Security'><Select Path='Security'>*[System[(band(Keywords,9227875636482146304))]]</Select></Query><Query Id='2' Path='Security'><Select Path='Security'>*[System[(band(Keywords,9227875636482146304))]]</Select></Query><Query Id='3' Path='Application'><Select Path='Application'>*[System[(band(Keywords,36028797018963968))]]</Select></Query><Query Id='4' Path='Application'><Select Path='Application'>*[System[(band(Keywords,40532396646334464))]]</Select></Query><Query Id='5' Path='Application'><Select Path='Application'>*[System[(band(Keywords,36028797018963968))]]</Select></Query><Query Id='6' Path='Application'><Select Path='Application'>*[System[(band(Keywords,36028797018963968))]]</Select></Query><Query Id='7' Path='System'><Select Path='System'>*[System[(band(Keywords,36028797018963968))]]</Select></Query><Query Id='8' Path='Application'><Select Path='Application'>*[System[(band(Keywords,36028797018963968))]]</Select></Query><Query Id='9' Path='OpenSSH/Operational'><Select Path='OpenSSH/Operational'>*[System[(band(Keywords,4611686018427387904))]]</Select></Query><Query Id='10' Path='Microsoft-Windows-RemoteDesktopServices-RdpCoreTS/Operational'><Select Path='Microsoft-Windows-RemoteDesktopServices-RdpCoreTS/Operational'>*[System[(band(Keywords,4611686018427387904))]]</Select></Query><Query Id='11' Path='Application'><Select Path='Application'>*[System[(band(Keywords,36028797018963968))]]</Select></Query><Query Id='12' Path='System'><Select Path='System'>*[System[(band(Keywords,36028797018963968))]]</Select></Query></QueryList> 2021-04-27 17:57:10.4203|WARN|DigitalRuby.IPBanCore.Logger|Ignoring event viewer paths: VisualSVNServer 2021-04-27 17:57:10.5283|INFO|DigitalRuby.IPBanCore.Logger|Config file changed 2021-04-27 17:57:10.5510|INFO|DigitalRuby.IPBanCore.Logger|Local ip address: 10.10.10.8 2021-04-27 17:57:12.0465|INFO|DigitalRuby.IPBanCore.Logger|Remote ip address: 184.249.23.206 2021-04-27 17:57:18.3674|WARN|DigitalRuby.IPBanCore.Logger|Updating firewall with 0 entries... 2021-04-27 17:57:18.3703|INFO|DigitalRuby.IPBanCore.Logger|Firewall entries updated:
Beta Was this translation helpful? Give feedback.
All reactions