Plesk brute force protection – How we set up and fix errors

Brute force attacks are actually annoying and make the whole web-site down.

But, can we do something to stay clear of this attack?

Yes. Well-liked handle panels like Plesk present Fail2ban aka IP Address Banning that protects web sites from brute-force attacks.

Having said that, complications like deprecated directives in the .htaccess file avoid the correct functioning of Fail2ban.

At Bobcares, we generally get requests from our shoppers to configure Plesk brute force protection as component of our Server Management Solutions.

Currently, we’ll see the motives and how our Assistance Engineers configure brute force protection on Plesk and repair associated errors.


How we set up Plesk to automatically ban IP addresses

IP address banning is an successful utility against brute-force attacks on a Plesk Linux server. It permits managing IP address banning on the server. Also, it monitors malicious indicators like as well several password failures, exploits, and so forth.

In order to execute IP address banning, we really should set up the Fail2Ban element on the server.

We use the following command to execute the IP banning manually,

For instance,

plesk bin ip_ban --update -ban_period 120 -ban_time_window 120 -max_retries 3

Also, we set up Plesk to automatically ban IP addresses as follows.

1. Initially, we go to Tools & Settings > IP Address Banning.

2. Then, we activate the Fail2Ban service by picking the checkbox for Allow intrusion detection.

And, we fill the following settings:

  1. IP address ban period
  2. The time interval for the detection of subsequent attacks
  3. The quantity of failures prior to the IP address is banned

3. Lastly, we click OK.


How we repair the errors associated to brute force protection on Plesk

At Bobcares, exactly where we have additional than a decade of experience in managing servers, we see several shoppers face complications although configuring brute force protection on Plesk.

Now let’s see how our Assistance Engineers fixed the best errors.


1. Deprecated detectives in the .htaccess file

Not too long ago, a single of our shoppers had a trouble soon after setting up Fail2Ban on the server. Fail2Ban blocked guests’ IP addresses soon after opening a web-site. And got an error ERR_CONNECTION_TIMED_OUT.

By investigating, we identified the following error in the /var/log/fail2ban.log file.

fail2ban.actions [1343]: NOTICE [plesk-apache] Ban 181.xx.yy.2

This error occurred due to the presence of deprecated detectives in the .htaccess file. Hence, we searched for each and every .htaccess file inside the domain house folder and checked the deny directives in the .htaccess file.

To repair the error, we changed the code from

Order let,deny
Permit from all


Demand all granted

This fixed the trouble and IP banning began functioning fine.


2. As well several login attempts

In some cases, a valid user IP can be blocked on the server when attempting distinct passwords. This specifically occurs in scenarios exactly where the user can’t recall passwords.

Right here, the user may well get a Connection timed out message for mail, net, SSH, and so forth.

The error will appear like:

ssh: connect to host port 2022: Connection refused

Then, we verify regardless of whether the IP address is blocked or not by making use of the following command.

iptables -n -L

Subsequent, if it is listed we unban the IP address.

In addition, we recommend shoppers enter the appropriate login facts.


[Getting error after enabling brute force protection? We’;ll fix it for you.] 



In quick, in order to strengthen the server safety, we allow Plesk brute force protection on servers to avoid attacks. We also discussed the techniques in which our Assistance Engineers repair associated errors.

The post Plesk brute force protection – How we set up and repair errors appeared initial on Bobcares.