this post was submitted on 17 Apr 2025
63 points (95.7% liked)

Selfhosted

46172 readers
552 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

cross-posted from: https://reddthat.com/post/39309359

I've been running Home Assistant for three years. It's port forwarded on default port 8123 via a reverse proxy in a dedicated VM serving it over HTTPS and is accessible over ipv4 and ipv6. All user accounts have MFA enabled.

I see a notification every time there's a failed login attempt, but every single one is either me or someone in my house. I've never seen a notification for any other attempts from the internet. Not a single one.

Is this normal? Or am I missing something? I expected it to be hammered with random failed logins.

you are viewing a single comment's thread
view the rest of the comments
[–] catloaf@lemm.ee 11 points 5 days ago (2 children)

Check the web server access logs. I'm sure you'll see exploit attempts, but for software you're not running. WordPress is what I see most often. Those probably won't generate emails.

[–] tuckerm@feddit.online 7 points 5 days ago

Yeah, literally all of mine these days are trying to go to /wp_admin.php and /phpmyadmin.

Side note: this made me think, "I wonder how the phpMyAdmin project is doing these days," and wow, all of their corporate sponsors are online vape shops and places to buy fake social media followers. (https://www.phpmyadmin.net/) What the heck is going on there? I know that funding open source projects is almost impossible, so I understand taking whatever money you can get. But it looks pretty bad when phpMyAdmin is a huge target for bots trying to steal your database, and then the entire project seems to be sponsored by companies that need emails and passwords to create fake social media activity.

[–] irmadlad@lemmy.world 2 points 5 days ago (2 children)

What is it about Wordpress? I've never used it, but it seems that every other day there is a new Wordpress exploit, and that's been going on for years.

[–] clb92@feddit.dk 4 points 5 days ago

It's a huuuugely popular CMS used on around 40% of all websites on the internet, and it has around 70,000 plugins available of varying quality. Most exploits are from badly written plugins.

[–] slazer2au@lemmy.world 2 points 5 days ago (2 children)

I think of it like Bethesda games.

It's passable for what you want, but the real value is the plugins that can fix what problems you have.

But all those plugins also have security vulnerabilities that need to be managed.

Just don't look behind the curtain to see what the CEO is up to.

[–] excess0680@lemmy.world 2 points 3 days ago

Incredible yet accurate analogy

[–] irmadlad@lemmy.world 2 points 4 days ago

Just don’t look behind the curtain to see what the CEO is up to.

Had to go look it up. What a cluster. Anyways, I don't blog mainly because I don't have anything to say that people would be interested in. Maybe farming. LOL I've just wondered down through the years why someone didn't fix all the attack surfaces Wordpress seems to have. Plus it drives a substantial share of websites, so I guess it's a good target to go after.