# Fail2Ban configuration file # # Regexp to detect not found access on pages (public or not) so we can add mitigation on IP making too much # access to a Dolibarr instance. [Definition] # To test, you can inject this example into log # echo 'myvirtualhost.com:443 1.2.3.4 - - [15/Dec/2022:09:57:47 +0000] "GET /attemptedpage HTTP/1.1" 404 123 "-" "Mozilla"' >> /var/log/apache2/other_vhosts_access.log # echo '1.2.3.4 - - [18/Jul/2024:00:17:15 +0000] "GET /attemptedpage HTTP/1.1" 404 4142 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0"' >> /var/log/apache2/access_ssl.log # WARNING: Set the date in log that is current date # # then # fail2ban-client status web-accesslog-limit404 # # To test rule file on a existing log file # fail2ban-regex /var/log/apache2/other_vhosts_access.log /etc/fail2ban/filter.d/web-accesslog-limit404.conf failregex = - - .*HTTP/[0-9]+(.[0-9]+)?" 404 ignoreregex =