Sending Malicious IPs to AbuseIPDB from SolarWinds Serv-U FTP Server.
This manual provides detailed instructions on how to configure an event in SolarWinds Serv-U FTP Server to automatically report IP addresses involved in brute-force attempts to AbuseIPDB using a PowerShell script named Serv-UToAbuseIPDB
. By automating this process, administrators can enhance their server's security by ensuring that malicious IP addresses are promptly reported and potentially blocked from further attacks.
- Open the Serv-U Management Console and log in with administrative credentials.
- In the left-hand menu, click on
Events
.
- Click the
Add
button to create a new event.
- In the Event dialog, specify the event type that will trigger the script. For example, select "Login Attempt" if you want to report failed login attempts.
- Set additional filters or conditions if necessary (e.g., report only failed login attempts).
- In the Actions section of the event configuration, select
Execute Command
.
- Command: Enter the path to the PowerShell executable, typically
powershell.exe
(C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe) - Arguments: Enter the script path and the
$IP
variable. The complete argument string should look like this:Ensure that the path to-File "C:\Path\To\Serv-UToAbuseIPDB.ps1" -ipAddress "$IP"
Serv-UToAbuseIPDB.ps1
is correct and that the script has the necessary execution permissions.
- Click
Save
to create the event with the specified configuration.
Here is the PowerShell script Serv-UToAbuseIPDB.ps1
which will be executed by the event:
param (
[string]$ipAddress
)
# Configure your AbuseIPDB API Key
$apiKey = "YOUR_API_KEY_HERE"
# Configure the URL for the AbuseIPDB API endpoint
$apiUrl = "https://api.abuseipdb.com/api/v2/report"
# Create the request body
$body = @{
ip = $ipAddress
categories = "5" # Category 5 for FTP Brute-Force
comment = "FTP Server detected a brute-force attempt from IP $ipAddress"
}
# Convert the request body to JSON
$bodyJson = $body | ConvertTo-Json
# Send the POST request to AbuseIPDB
$response = Invoke-RestMethod -Uri $apiUrl -Method Post -ContentType "application/json" -Headers @{
"Key" = $apiKey
"Accept" = "application/json"
} -Body $bodyJson
# Display the response
$response
- Trigger the event manually or wait for it to occur naturally.
- Verify that the PowerShell script runs as expected and reports the IP address to AbuseIPDB.
- Check the logs in Serv-U and AbuseIPDB for successful execution and reporting.
By following this manual, you have successfully configured SolarWinds Serv-U FTP Server to trigger a PowerShell script upon a specified event, reporting IP addresses involved in brute-force attempts to AbuseIPDB. This integration helps enhance your server's security by automating the reporting process.
Feel free to reach out to SolarWinds support or consult the official documentation for more detailed configurations and troubleshooting steps...