CrowdSec
Last updated
Last updated
CrowdSec Security Engine, the open-source intrusion prevention system written in Go, protects against attacks on any server by parsing real-time service logs (servers, SSH, WordPress etc. logs) by detecting malicious behaviors.
All our servers are checked for SSH brute force, Log4j exploits and any CVE's that CS can detect. In addition to that, they're configured to monitor logs for the relevant apps on each server, such as attacks against Pterodactyl, Kasm and AdGuard (eg credential brute force).
This app is hosted externally, with a client installed on each VM. This is pushed out via Ansible
Integration | Host | Purpose |
---|---|---|
NFTables
Any server with a port forward
Add malicious IPs to firewall blocklists
SSH
All servers
Monitors for bruteforce login attempts
Cloudflare
Lungo, Cola, Mocha, Latte
Provide malicious IP's with Captcha requests before accessing agamersgrind.com, agamersgrind.dev, xfgn.dev and lattemedia.tv
UptimaKuma
Cola
Monitors for brute force login attempts
AdGuard
Americano, Espresso
Monitors for brute force login attempts
Wireguard
Cappuccino
Monitors for bruteforce login attempts
Pterodactyl Wings
Cocoa, Mocha
Monitors for bruteforce login attempts
Wordpress - AGG
Cocoa
Monitors for bruteforce login attempts
Kasm
Latte
Monitors for bruteforce login attempts
Proxmox
Macaroni
Monitors for bruteforce login attempts
DSM
Fettuccine
Monitors for bruteforce login attempts