[asterisk-users] Asterisk secure fine tune - stop attack
motty.cruz at gmail.com
Thu Sep 4 10:12:02 CDT 2014
Thanks, looks like fail2ban is the way to go, I would prefer a different
alternatives if there is one. I tried deny=IP/netmask but did not work for
me, in sip.conf. seems like fail2ban is what you all are using, so I will
give it a try.
On Thu, Sep 4, 2014 at 7:58 AM, Thorsten Göllner <tg at ovm-group.com> wrote:
> Am 04.09.2014 16:44, schrieb motty cruz:
> Hi All,
> I see this kind of attack on our Asterisk Server, do you know how to block
> that IP?
> [Sep 4 07:41:06] NOTICE: chan_sip.c:23375 handle_request_invite:
> Call from '' (220.127.116.11:9306) to extension '34422' rejected because
> extension not found in context 'default'.
> You should not invest time in blocking single IPs. Take a look at
> -- Bandwidth and Colocation Provided by http://www.api-digital.com --
> New to Asterisk? Join us for a live introductory webinar every Thurs:
> asterisk-users mailing list
> To UNSUBSCRIBE or update options visit:
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the asterisk-users