{"version":"1.0","provider_name":"Blog | informaticapremium","provider_url":"https:\/\/www.informaticapremium.com\/blog","author_name":"Eduardo","author_url":"https:\/\/www.informaticapremium.com\/blog\/author\/edumoreno\/","title":"Bloqueando reincidentes de Fail2ban - Blog | informaticapremium","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"YCa0r4gtxE\"><a href=\"https:\/\/www.informaticapremium.com\/blog\/bloqueando-reincidentes-fail2ban\/\">Bloqueando reincidentes de Fail2ban<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.informaticapremium.com\/blog\/bloqueando-reincidentes-fail2ban\/embed\/#?secret=YCa0r4gtxE\" width=\"600\" height=\"338\" title=\"\u00abBloqueando reincidentes de Fail2ban\u00bb \u2014 Blog | informaticapremium\" data-secret=\"YCa0r4gtxE\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/i1.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2016\/09\/fail2ban-logo.jpg?fit=640%2C454&ssl=1","thumbnail_width":640,"thumbnail_height":454,"description":"Fail2ban escanea logs (por ejemplo\u00a0\/var\/log\/auth.log), bloqueando IPs\u00a0que muestran comportamientos maliciosos. Es una gran herramienta en la que se pueden configurar jaulas para los diferentes tipos de servicios que teng\u00e1is en vuestro servidor, protegiendo de esta manera intentos de acceso con contrase\u00f1a err\u00f3nea (fuerza bruta) o incluso bots maliciosos en busca de p\u00e1ginas comunes entre tus &hellip; Continuar leyendo \"\""}