HI
How can you avoid scanning users on your xtream ui server?
And thanks
How can you avoid scanning users on your xtream ui server?
And thanks
you can make proxy and install fail2banHI
How can you avoid scanning users on your xtream ui server?
And thanks
Place a aproxy behind main and use cloudflare and fail2ban. Problem solved. It works really good with very fast zapping if you know what you doHI
How can you avoid scanning users on your xtream ui server?
And thanks
Channels | MatchTime Unblock CDN | Offshore Server | Contact |
100 cnx / 90€ | 5Gbps / 180€ | 48CPU-256GRAM 10Gbps 569€ | Skype live:giefsl |
500 cnx / 350€ | 10Gbps / 350€ | 48CPU-128GRAM 5Gbps / 349€ | TG @changcdn |
1000 cnx / 500€ | 20Gbps / 700€ | 40CPU-128GRAM 20Gbps / €980 | http://coronaserver.com |
hi could you message me how to do this pleasePlace a aproxy behind main and use cloudflare and fail2ban. Problem solved. It works really good with very fast zapping if you know what you do
It is not like click a button.hi could you message me how to do this please![]()
HI
How can you avoid scanning users on your xtream ui server?
And thanks
Channels | MatchTime Unblock CDN | Offshore Server | Contact |
100 cnx / 90€ | 5Gbps / 180€ | 48CPU-256GRAM 10Gbps 569€ | Skype live:giefsl |
500 cnx / 350€ | 10Gbps / 350€ | 48CPU-128GRAM 5Gbps / 349€ | TG @changcdn |
1000 cnx / 500€ | 20Gbps / 700€ | 40CPU-128GRAM 20Gbps / €980 | http://coronaserver.com |
have tried this has not worked device is still locking up have to unplugTutorial - SOLUTION FOR THE issue of Leaked MAG user and password ON XTREAM UI BASED PANEL
hi finally i have found solution for the issue of Leaked MAG user and password associated to mag account on all xtream ui f22 based panel: please firt go to ssh on mainserver tape this command : crontab -e then enter shoose first choice "nano editer" you are now in...www.worldofiptv.com
You can find somehwere in the forum a pattern for fail2ban, but your best bet is to place your main (portal) beihnd cloudlfare, from there you can disallow per user agent, countries, asn or even place your portal under attack.have tried this has not worked device is still locking up have to unplug
hi buddy, is possible you can explain it step by step? i have onterprise proxy in the middle to protect Main with XUI ONE, but still i see this fuckers try to hack lines and mac's! i want understood how i can protect my service!Place a aproxy behind main and use cloudflare and fail2ban. Problem solved. It works really good with very fast zapping if you know what you do
Channels | MatchTime Unblock CDN | Offshore Server | Contact |
100 cnx / 90€ | 5Gbps / 180€ | 48CPU-256GRAM 10Gbps 569€ | Skype live:giefsl |
500 cnx / 350€ | 10Gbps / 350€ | 48CPU-128GRAM 5Gbps / 349€ | TG @changcdn |
1000 cnx / 500€ | 20Gbps / 700€ | 40CPU-128GRAM 20Gbps / €980 | http://coronaserver.com |
Search within all inbounds and clientsHI
How can you avoid scanning users on your xtream ui server?
And thanks
Maximum Login Attempts :2hi buddy, is possible you can explain it step by step? i have onterprise proxy in the middle to protect Main, but still i see this fuckers try to hack lines and mac's! i want understood how i can protect my service!
iptables -F
then
apt-get install iptables-persistent
service netfilter-persistent save
service netfilter-persistent reload
if you get command not found then enter ( since ubuntu 16 it was changed to netfilter). older distros will be called in old name. Like this one below.
service iptables-persistent save
service iptables-persistent reload
Now buy vpn with STATIC IP ADDRESS. IMPORTANT
enter:
iptables -A INPUT -s 127.0.0.1 -p ALL -j ACCEPT
next:
iptables -A INPUT -s YOURS_STATCI_IP -p ALL -j ACCEPT
next all LB ip divided with comma. You list enter all ips and enter them all at once.
iptables -A INPUT -s 111.111.111.111,222.222.222.222, -p ALL -j ACCEPT
next:
iptables -A INPUT -s RESELLER_IP -p ALL -j ACCEPT
Now if you enter
sudo iptables -L --line-numbers
you will get rules with corresponding number. (1,2,3... etc)
Now we are going to protect server ( disables ping request and blocking admin port and SSH port)
iptables -A INPUT -p icmp --icmp-type echo-request -j DROP
iptables -A INPUT -p tcp -m tcp --dport 25500 -j REJECT
iptables -A INPUT -p tcp -m tcp --dport 22 -j REJECT
NOW VERY IMPORTANT WE MUST S IPTABLES RULES
service netfilter-persistent save
AND
service netfilter-persistent reload
AFTER EACH REBOOT SERVER WILL KEEP IPTABLES.
You can also block countries with shortcuts
iptables -A INPUT -m geoip --src-cc CN,TW -j DROP
And again
service netfilter-persistent save
service netfilter-persistent reload
*******
ADD IPTABLES AS MENSIONED ABOVE TO ALL OF YOUR SERVERS