Support

Admin Tools

#40334 More than hunderd attacks in one minute from one IP while Auto ban is set at 4/hour.

Posted in ‘Admin Tools for Joomla! 4 & 5’
This is a public ticket

Everybody will be able to see its contents. Do not include usernames, passwords or any other sensitive information.

Environment Information

Joomla! version
4.4.3
PHP version
8.1.27
Admin Tools version
7.4.8

Latest post by nicholas on Thursday, 22 February 2024 09:46 CST

NicoFaaij

Dear support,

More and more I get hundreds of attacks within 1 minute from just one IP-address. For example, last night I got 149 Suspicious Core Parameter from IP 220.250.61.238 between 2024-02-22 05:00:05 CET andΒ 2024-02-22 05:01:03 CET, without other requests from any other IP-adresses..

I don't understand how this is possible as I have set Auto-ban to 4/hour.

They tried to add SQL selects within URL's of my Community Builder component.

I don't want to give hackers more than 4 options to try to query my Database before they get blocked for 1 day. Do you know why they are able to do so much attacks and how I can reduce that?

Many thanks in advance,

Nico

NicoFaaij

Attachment

NicoFaaij

3rd try attachment as it was .PNG instead of .png ;-)

nicholas
Akeeba Staff
Manager

Is it possible that all the request came at around the same time? In this case, multiple server processes are trying to cope with all the requests at once. Since each of these requests spawns a Joomla! application, and the starting state of the temporary IP blocking at application startup does not include the attacker's IP address they are not aware that another process has, is, or will be blocking that IP address at the same time (PHP does not have shared state).

Nicholas K. Dionysopoulos

Lead Developer and Director

πŸ‡¬πŸ‡·Greek: native πŸ‡¬πŸ‡§English: excellent πŸ‡«πŸ‡·French: basic β€’ πŸ• My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!

NicoFaaij

Thanks, Nicholas, for your quick reply,

I think you are right. I see also things like "sleep" and "wait for delay" in those requests, maybe to keep the finishing times of these requests synchronized?

Is there something we can do to stop these brute-force fishing expeditions?

nicholas
Akeeba Staff
Manager

Yes, you got a very high iowait (the processes marked as you mentioned) exactly because there were many more requests than your server could realistically handle at once.

You can't really stop these requests from coming in. Using something like CloudFlare or Sucuri in front of your site would help, though, as they can detect anomalies at the network level and challenge the requests before they hit your server. That is to say, they present a CAPTCHA to the user hosted on their own server. If the user completes the CAPTCHA correctly, only then does the request hit your server. This is enough to block the vast majority of these brute-force fishing expeditions as you correctly called them.

Nicholas K. Dionysopoulos

Lead Developer and Director

πŸ‡¬πŸ‡·Greek: native πŸ‡¬πŸ‡§English: excellent πŸ‡«πŸ‡·French: basic β€’ πŸ• My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!

Support Information

Working hours: We are open Monday to Friday, 9am to 7pm Cyprus timezone (EET / EEST). Support is provided by the same developers writing the software, all of which live in Europe. You can still file tickets outside of our working hours, but we cannot respond to them until we're back at the office.

Support policy: We would like to kindly inform you that when using our support you have already agreed to the Support Policy which is part of our Terms of Service. Thank you for your understanding and for helping us help you!