I have our ASG locked down so that only internal network segments and Astaro Support networks can access the Webmin and SSH interfaces.
My ASG has 1 interface connected to a vendor managed WiFi hotspot where email address authentication is required.
In have had 26,000 failed Webmin login attempts over the past 4 weeks at one of our locations via the WiFi and coincidentally this location is located next door to a Radio Shack. I know how to lock down ASG to prevent this interface to have access to the ASG Webmin but the "get off my lawn" grumpy old man part of me wants to catch this script-kiddie-wanna-be.
I would like to know where the ASG logs the failed webmin attempts so I can track down the abuser by cross referencing the WiFi users and the attempts.
This thread was automatically locked due to age.