• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • We are looking for U.S.-based freelancer or agency working with SEO or WordPress for a quick 30-min interviews to gather feedback on XOVI, a successful German SEO tool we’re looking to launch in the U.S.
    If you qualify and participate, you’ll receive a $30 Amazon gift card as a thank-you. Please apply here. Thanks for helping shape a better SEO product for agencies!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Resolved unknown domain pointing to my server

zoni

Basic Pleskian
Hello,

A domain not own by me or any of my clients is pointing to my server and causing a lot of errors in logs, especially in maillog, with loads of relay access denied errors.

Anyone browsing to this domain will see my server´s default page.

Is there any way to stop traffic from this domain?

Thanks.
 
Hi zoni,

did you consider to use Fail2Ban ( and there as well the "recidive" - jail ) ?
 
You can run these commands in the given order to block all traffic directed to a specific domain name, regardless whether that domain name actually exists on the host or not:

Code:
iptables -I INPUT 1 -p tcp -m multiport --dports 80,443,7080,7081,8443,8447 -m string --algo bm --string "DOMAIN.TLD" -j REJECT --reject-with tcp-reset
iptables -I FORWARD 1 -p tcp -m multiport --dports 80,443,7080,7081,8443,8447 -m string --algo bm --string "DOMAIN.TLD" -j REJECT --reject-with tcp-reset
iptables -I OUTPUT 1 -p tcp -m multiport --dports 80,443,7080,7081,8443,8447 -m string --algo bm --string "DOMAIN.TLD" -j REJECT --reject-with tcp-reset

Instead of "DOMAIN.TLD" enter the domain name that the traffic is directed to.

The example only blocks all traffic to web service related ports. If you are having trouble with mail, add these port numbers to the list, too:
25,110,143,93,995
 
Back
Top