The active response I set to the rule (if interest) is the following: <active-response> <command>firewall-drop</command> <rules_id>100205</rules_id> <location>all</location> <timeout>600</timeout> <repeated_offenders>30,60,120,240,480</repeated_offenders> </active-response>
Thanks for the help everyone, and kind regards, Fredrik Den måndag 26 juni 2017 kl. 11:15:22 UTC+2 skrev Jesus Linares: > > Good job. > > Also, you can block the IP using active response > <https://blog.wazuh.com/blocking-attacks-active-response/>. > > Regards. > > On Monday, June 26, 2017 at 11:12:02 AM UTC+2, Fredrik Hilmersson wrote: >> >> Hello Jesus, >> >> So, I think I've got the rule to work. >> >> 1. Rule: >> >> <rule id="100205" level="0"> >> <if_sid>31101</if_sid> >> <decoded_as>web-accesslog</decoded_as> >> <match> Jorgee$</match> >> <description>Jorgee vulnerability scanner</description> >> </rule> >> >> 2. Logtest output: >> >> SRCIP - - [26/Jun/2017:08:38:43 +0200] "HEAD >> http://HOSTIP:80/phpmyadmin4/ HTTP/1.1" 404 0 "-" "Mozilla/5.0 Jorgee >> >> **Phase 1: Completed pre-decoding. >> full event: 'SRCIP - - [26/Jun/2017:08:38:43 +0200] "HEAD >> http://HOSTIP:80/phpmyadmin4/ >> HTTP/1.1" 404 0 "-" "Mozilla/5.0 Jorgee' >> >> hostname: 'agent-id' >> program_name: '(null)' >> log: 'SRCIP - - [26/Jun/2017:08:38:43 +0200] "HEAD >> http://HOSTIP:80/phpmyadmin4/ HTTP/1.1" 404 0 "-" "Mozilla/5.0 Jorgee' >> >> **Phase 2: Completed decoding. >> >> decoder: 'web-accesslog' >> srcip: 'SRCIP' >> url: 'http://HOSTIP:80/phpmyadmin4/' >> id: '404' >> >> **Phase 3: Completed filtering (rules). >> >> Rule id: '100205' >> Level: '0' >> Description: 'Jorgee vulnerability scanner' >> >> Kind regards, >> Fredrik >> >> Den måndag 26 juni 2017 kl. 10:48:16 UTC+2 skrev Jesus Linares: >>> >>> What is the output of ossec-logtest?. >>> >>> Once you have a rule for that event, you can create an active response. >>> >>> Regards. >>> >>> On Sunday, June 25, 2017 at 12:06:23 AM UTC+2, Fredrik Hilmersson wrote: >>>> >>>> I spoke to early, Still getting spammed ... >>>> >>>> Den lördag 24 juni 2017 kl. 22:20:13 UTC+2 skrev Fredrik Hilmersson: >>>>> >>>>> Thank you! >>>>> >>>>> Den lördag 24 juni 2017 kl. 21:21:48 UTC+2 skrev dan (ddpbsd): >>>>>> >>>>>> On Sat, Jun 24, 2017 at 2:08 PM, Fredrik Hilmersson >>>>>> <f.hilm...@worldclearing.org> wrote: >>>>>> > Hello, >>>>>> > >>>>>> > so recently I got spammed by this vulnerability scanner. >>>>>> > The HEAD is always the same, in regards to the $user_agent, Jorgee >>>>>> > >>>>>> > ** Alert 1498324205.1278330: - web,accesslog, >>>>>> > 2017 Jun 24 17:10:05 (OSSEC AGENT) SRCIP->/var/log/nginx/access.log >>>>>> > Rule: 31101 (level 5) -> 'Web server 400 error code.' >>>>>> > 213.119.18.4 - - [24/Jun/2017:19:10:05 +0200] HEAD >>>>>> > http://SRCIP:80/sql/phpmyadmin2/ HTTP/1.1 404 0 - Mozilla/5.0 >>>>>> Jorgee >>>>>> > >>>>>> > So i'm wondering if anyone has a good idea or rule how to block/ban >>>>>> these >>>>>> > attempts? >>>>>> > >>>>>> > Kind regards, >>>>>> > Fredrik >>>>>> > >>>>>> >>>>>> Possibly something like: >>>>>> <rule id="999999" level="0"> >>>>>> <decoded_as>nginx-errorlog</decoded_as> >>>>>> <match> Jorgee$</match> >>>>>> <description>Jorgee is loud</description> >>>>>> </rule> >>>>>> >>>>>> >>>>>> > -- >>>>>> > >>>>>> > --- >>>>>> > You received this message because you are subscribed to the Google >>>>>> Groups >>>>>> > "ossec-list" group. >>>>>> > To unsubscribe from this group and stop receiving emails from it, >>>>>> send an >>>>>> > email to ossec-list+...@googlegroups.com. >>>>>> > For more options, visit https://groups.google.com/d/optout. >>>>>> >>>>> -- --- You received this message because you are subscribed to the Google Groups "ossec-list" group. To unsubscribe from this group and stop receiving emails from it, send an email to ossec-list+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.