<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thank you sir. I kind of in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/multi-port-scanning-from-outside/m-p/2569256#M197802</link>
    <description>&lt;P&gt;Thank you sir. I kind of figured that was the case, but thought Id take a chance.&lt;/P&gt;&lt;P&gt;bob&lt;/P&gt;</description>
    <pubDate>Mon, 19 Jan 2015 18:24:12 GMT</pubDate>
    <dc:creator>mx</dc:creator>
    <dc:date>2015-01-19T18:24:12Z</dc:date>
    <item>
      <title>Multi port scanning from outside</title>
      <link>https://community.cisco.com/t5/network-security/multi-port-scanning-from-outside/m-p/2569254#M197800</link>
      <description>&lt;P&gt;Hello, I am running an ASA 5505 with 8.2(2) ios. I am running a very simple web server inside on port 80 and more importantly an email server.&lt;/P&gt;&lt;P&gt;When I check my IIS logs for the web server I see countless attempts by hackers to gain access to phpMyAdmin etc etc which I am not running. I have been safe so far.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question is, these hacking attempts are clearly from the same person as they come in huge batches, but their source IP address changes with each attempt. Obviously I cant block by IP address, and that would be a full time job anyway.&amp;nbsp; Is there another way to block such attempts? Say after 2 attempts at a certain URL they are automatically blacklisted, or any php attempts would be blacklisted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for any input!&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:21:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-port-scanning-from-outside/m-p/2569254#M197800</guid>
      <dc:creator>mx</dc:creator>
      <dc:date>2019-03-12T05:21:54Z</dc:date>
    </item>
    <item>
      <title>Bob-You would need something</title>
      <link>https://community.cisco.com/t5/network-security/multi-port-scanning-from-outside/m-p/2569255#M197801</link>
      <description>&lt;P&gt;Bob-&lt;/P&gt;&lt;P&gt;You would need something with a little more intelligence like IPS. You can setup rules to do exactly that. Unfortunately the ASA can't do that out-of-the-box. If you would like to explore that further take a look at Cisco's Sourcefire solution. It's an IPS that runs on the ASA (must be on the new ASA-X model though). Let us know if you have any other questions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jan 2015 18:21:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-port-scanning-from-outside/m-p/2569255#M197801</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-01-19T18:21:46Z</dc:date>
    </item>
    <item>
      <title>Thank you sir. I kind of</title>
      <link>https://community.cisco.com/t5/network-security/multi-port-scanning-from-outside/m-p/2569256#M197802</link>
      <description>&lt;P&gt;Thank you sir. I kind of figured that was the case, but thought Id take a chance.&lt;/P&gt;&lt;P&gt;bob&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jan 2015 18:24:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-port-scanning-from-outside/m-p/2569256#M197802</guid>
      <dc:creator>mx</dc:creator>
      <dc:date>2015-01-19T18:24:12Z</dc:date>
    </item>
  </channel>
</rss>

