(11-13-2014, 04:30 AM)Tango Wrote: The problem is that: Why they acces THERE? (/etc/sentora/panel)
My panel is panel.domain.tld.
hi,
I (and probably every servers) have hundred of such attempts.
I think these file are searched by hack bots because some version have security failure, in attempt to hack the server which hosts them.
As I was bored from these logs and attempts, I redirected the 10 most targeted files to a garbage file, so they can play with it ! (the extra load of the server is even not visible) :-)
The access to files /etc/sentora/panel correspond to your panel URL, but also to access to the server by IP.
You can block access by IP by creating a default virtual host placed BEFORE the first real vhosts, so it must reside in /etc/sentora/configs/apache/httpd.conf file, before the call to vhost file.
The end of my httpd.conf file look like that :
Code:
site to forbid sentora login page from direct IP access
Listen 80
<virtualhost *:80>
redirect 404 /
</virtualhost>
# Include the generic VHOST configuration file that holds all vhosts
Include /etc/sentora/configs/apache/httpd-vhosts.conf