cross-posted from: https://reddthat.com/post/39309359

I’ve been running Home Assistant for three years. It’s port forwarded on default port 8123 via a reverse proxy in a dedicated VM serving it over HTTPS and is accessible over ipv4 and ipv6. All user accounts have MFA enabled.

I see a notification every time there’s a failed login attempt, but every single one is either me or someone in my house. I’ve never seen a notification for any other attempts from the internet. Not a single one.

Is this normal? Or am I missing something? I expected it to be hammered with random failed logins.

  • catloaf@lemm.ee
    link
    fedilink
    English
    arrow-up
    11
    ·
    2 days ago

    Check the web server access logs. I’m sure you’ll see exploit attempts, but for software you’re not running. WordPress is what I see most often. Those probably won’t generate emails.

    • tuckerm@feddit.online
      link
      fedilink
      English
      arrow-up
      7
      ·
      2 days ago

      Yeah, literally all of mine these days are trying to go to /wp_admin.php and /phpmyadmin.

      Side note: this made me think, “I wonder how the phpMyAdmin project is doing these days,” and wow, all of their corporate sponsors are online vape shops and places to buy fake social media followers. (https://www.phpmyadmin.net/) What the heck is going on there? I know that funding open source projects is almost impossible, so I understand taking whatever money you can get. But it looks pretty bad when phpMyAdmin is a huge target for bots trying to steal your database, and then the entire project seems to be sponsored by companies that need emails and passwords to create fake social media activity.

    • irmadlad@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 days ago

      What is it about Wordpress? I’ve never used it, but it seems that every other day there is a new Wordpress exploit, and that’s been going on for years.

      • clb92@feddit.dk
        link
        fedilink
        English
        arrow-up
        4
        ·
        2 days ago

        It’s a huuuugely popular CMS used on around 40% of all websites on the internet, and it has around 70,000 plugins available of varying quality. Most exploits are from badly written plugins.

      • slazer2au@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 day ago

        I think of it like Bethesda games.

        It’s passable for what you want, but the real value is the plugins that can fix what problems you have.

        But all those plugins also have security vulnerabilities that need to be managed.

        Just don’t look behind the curtain to see what the CEO is up to.

        • irmadlad@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          1 day ago

          Just don’t look behind the curtain to see what the CEO is up to.

          Had to go look it up. What a cluster. Anyways, I don’t blog mainly because I don’t have anything to say that people would be interested in. Maybe farming. LOL I’ve just wondered down through the years why someone didn’t fix all the attack surfaces Wordpress seems to have. Plus it drives a substantial share of websites, so I guess it’s a good target to go after.