Subj : RE: preventing brute force attempts on privleged ports To : tonic From : NuSkooler Date : Wed Apr 07 2021 11:19 pm On Wednesday, April 7th tonic muttered... To> Anyone here running an enigma setup where they're forwarding Enigma to To> privliged ports like 22, 23, etc? To> I've never super investigated how enigma handles ssh calls but I'm To> curious if anyone is using a tool like SSHGuard or Fail2Ban to prevent To> bot spam on these ports. If you look though the archives, someone was looking to hook up fail2ban with enigma logs a bit back. -- |08 ■ |12NuSkooler |06// |12Xibalba |08- |07"|06The place of fear|07" |08 ■ |03xibalba|08.|03l33t|08.|03codes |08(|0344510|08/|03telnet|08, |0344511|08/|03ssh|08) |08 ■ |03ENiGMA 1/2 WHQ |08| |03Phenom |08| |0367 |08| |03iMPURE |08| |03ACiDic --- ENiGMA 1/2 v0.0.12-beta (linux; x64; 14.15.4) * Origin: Xibalba -+- xibalba.l33t.codes:44510 (21:1/121) .