Skip to main content

Mikrotik Bruteforce Login Prevention

Reference: WIKI

FTP Bruteforce prevention

This configuration allows only 10 FTP login incorrect answer per minutes

add chain=input protocol=tcp dst-port=21 src-address-list=ftp_blacklist action=drop comment="drop ftp brute forcers"

add chain=output action=accept protocol=tcp content="530 Login incorrect" dst-limit=1/1m,9,dst-address/1m

add chain=output action=add-dst-to-address-list protocol=tcp content="530 Login incorrect" address-list=ftp_blacklist address-list-timeout=3h

SSH Bruteforce prevention

This will prevent SSH bruteforcer to be banned for 10 days after repetitive attemps
add chain=input protocol=tcp dst-port=22 src-address-list=ssh_blacklist action=drop comment="drop ssh brute forcers" disabled=no

add chain=input protocol=tcp dst-port=22 connection-state=new src-address-list=ssh_stage3 action=add-src-to-address-list address-list=ssh_blacklist address-list-timeout=10d comment="" disabled=no

add chain=input protocol=tcp dst-port=22 connection-state=new src-address-list=ssh_stage2 action=add-src-to-address-list address-list=ssh_stage3 address-list-timeout=1m comment="" disabled=no

add chain=input protocol=tcp dst-port=22 connection-state=new src-address-list=ssh_stage1 action=add-src-to-address-list address-list=ssh_stage2 address-list-timeout=1m comment="" disabled=no

add chain=input protocol=tcp dst-port=22 connection-state=new action=add-src-to-address-list address-list=ssh_stage1 address-list-timeout=1m comment="" disabled=no
Example blocked IP address list:

Comments

Popular posts from this blog

Notes: about de novo assembly

De novo assembly [SFG standford]: http://sfg.stanford.edu/denovo.html A combined approach for de novo dna sequence assembly of very short reads (IPSJ transaction on Bioinformatics): https://www.jstage.jst.go.jp/article/ipsjtbio/4/0/4_0_21/_article to be continued...