-
+ Writing a parser for and analysing my VPS servers fail2ban logs.
diff --git a/blog/public/blog/index.xml b/blog/public/blog/index.xml
index 651886a..b7a75a7 100644
--- a/blog/public/blog/index.xml
+++ b/blog/public/blog/index.xml
@@ -15,12 +15,5 @@
http://localhost:1313/blog/bruteforce/<h1 id="introduction">Introduction</h1>
<p>Recently I set up this Website as a small side Project in order to learn a little bit of HTML, CSS and the use of static site generators. In order to host this website I used my VPS I own on <a href="https://www.ionos.de/">IONOS</a>. As someone who has spent a lot of time in the Cybersecurity world, I gave my best to secure the VPS as well as possible. Login via SSH is enabled only via Private/Public Key Authentification and <a href="https://github.com/fail2ban/fail2ban">Fail2Ban</a> is setup to ban anyone who tries to login more than 5 Times. Once this was setup I created a way to “pull” the logs from nginx and fail2ban onto my private ProxMox server and Process these into Grafana. As I was doing this, I noticed that the fail2ban logfile has over 31.000 rows. Nothing suspicious for a public IP Adress, yet a interesting amount of data.</p>
-
- Test
- http://localhost:1313/blog/test/
- Fri, 24 Oct 2025 00:00:00 +0000
- http://localhost:1313/blog/test/
- <p>Help Me</p>
-
diff --git a/blog/public/categories/index.html b/blog/public/categories/index.html
index 3915fae..dd27fd5 100644
--- a/blog/public/categories/index.html
+++ b/blog/public/categories/index.html
@@ -29,7 +29,7 @@
-Categories
+
diff --git a/blog/public/index.xml b/blog/public/index.xml
index f611f88..123e482 100644
--- a/blog/public/index.xml
+++ b/blog/public/index.xml
@@ -15,13 +15,6 @@
http://localhost:1313/blog/bruteforce/<h1 id="introduction">Introduction</h1>
<p>Recently I set up this Website as a small side Project in order to learn a little bit of HTML, CSS and the use of static site generators. In order to host this website I used my VPS I own on <a href="https://www.ionos.de/">IONOS</a>. As someone who has spent a lot of time in the Cybersecurity world, I gave my best to secure the VPS as well as possible. Login via SSH is enabled only via Private/Public Key Authentification and <a href="https://github.com/fail2ban/fail2ban">Fail2Ban</a> is setup to ban anyone who tries to login more than 5 Times. Once this was setup I created a way to “pull” the logs from nginx and fail2ban onto my private ProxMox server and Process these into Grafana. As I was doing this, I noticed that the fail2ban logfile has over 31.000 rows. Nothing suspicious for a public IP Adress, yet a interesting amount of data.</p>
-
- Test
- http://localhost:1313/blog/test/
- Fri, 24 Oct 2025 00:00:00 +0000
- http://localhost:1313/blog/test/
- <p>Help Me</p>
- Datenschutz
http://localhost:1313/datenschutz/
diff --git a/blog/public/tags/index.html b/blog/public/tags/index.html
index 88dec10..be18c86 100644
--- a/blog/public/tags/index.html
+++ b/blog/public/tags/index.html
@@ -29,7 +29,7 @@
-Tags
+