Cloudflare
CloudFlare protects and accelerates any website online. Once your website is a part of the CloudFlare community, its web traffic is routed through their intelligent global network. They automatically optimize the delivery of your web pages so your visitors get the fastest page load times and best performance. They also block threats and limit abusive bots and crawlers from wasting your bandwidth and server resources. The result is that your website sees a significant improvement in performance and a decrease in spam and other attacks.
Online threats range from nuisances like comment spam and excessive bot crawling to malicious attacks like SQL injection and denial of service (DOS) attacks. CloudFlare provides security protection against all of these types of threats and more to keep your website safe.
CloudFlare’s technology automatically detects new attacks that arise against any website on its network. Once CloudFlare identifies that there is a new attack, CloudFlare starts to block the attack for both the particular website and the entire community.
Saved bandwidth and server resources
By stopping threats before they get to your website you save bandwidth and resources. Your server is also freed up to serve your legitimate traffic optimally.
Firewall
A firewall controls access to the resources of a server through a positive control model. This means that the only traffic allowed onto the server defined in the firewall policy is; all other traffic is denied.
Blackdog uses ConfigServer Security & Firewall (csf). This provides an easily configurable means of closing all your windows and doors before leaving the house to help prevent unauthorised access and theft.
It comes with another useful tool that blocks brute force attacks. After a user defined number of login failures the attackers IP address becomes blocked from your server. Here are a few lines from my denial log as an example
37.191.119.254 # lfd: (sshd) Failed SSH login from 37.191.119.254 (GB/United Kingdom/no-reverse-dns.metronet-uk.com): 3 in the last 3600 secs - Wed Apr 29 05:37:34 2015
213.130.73.14 # lfd: (sshd) Failed SSH login from 213.130.73.14 (BG/Bulgaria/NOAC.netissat.net): 3 in the last 3600 secs - Wed Apr 29 05:44:24 2015
61.31.195.233 # lfd: (sshd) Failed SSH login from 61.31.195.233 (TW/Taiwan/61-31-195-233.static.tfn.net.tw): 3 in the last 3600 secs - Wed Apr 29 05:54:34 2015
118.96.202.222 # lfd: (sshd) Failed SSH login from 118.96.202.222 (ID/Indonesia/222.static.118-96-202.astinet.telkom.net.id): 3 in the last 3600 secs - Wed Apr 29 06:13:09 2015
182.100.67.102 # lfd: (sshd) Failed SSH login from 182.100.67.102 (CN/China/-): 3 in the last 3600 secs - Wed Apr 29 06:49:45 2015
132.197.249.151 # lfd: (sshd) Failed SSH login from 132.197.249.151 (US/United States/-): 3 in the last 3600 secs - Wed Apr 29 07:06:55 2015
79.4.157.204 # lfd: (sshd) Failed SSH login from 79.4.157.204 (IT/Italy/host204-157-static.4-79-b.business.telecomitalia.it): 3 in the last 3600 secs - Wed Apr 29 07:14:10 2015
115.248.223.206 # lfd: (sshd) Failed SSH login from 115.248.223.206 (IN/India/-): 3 in the last 3600 secs - Wed Apr 29 07:17:35 2015
128.104.55.8 # lfd: (sshd) Failed SSH login from 128.104.55.8 (US/United States/isx.chtc.wisc.edu): 3 in the last 3600 secs - Wed Apr 29 07:59:01 2015
202.71.103.254 # lfd: (sshd) Failed SSH login from 202.71.103.254 (MY/Malaysia/Vklsm254.wpdns.com): 3 in the last 3600 secs - Wed Apr 29 08:24:51 2015
141.101.6.186 # lfd: (sshd) Failed SSH login from 141.101.6.186 (UA/Ukraine/ppp-141-101-6-186.wildpark.net): 3 in the last 3600 secs - Wed Apr 29 08:31:32 2015
59.148.215.42 # lfd: (sshd) Failed SSH login from 59.148.215.42 (HK/Hong Kong/059148215042.ctinets.com): 3 in the last 3600 secs - Wed Apr 29 08:37:22 2015
213.192.228.4 # lfd: (sshd) Failed SSH login from 213.192.228.4 (ES/Spain/-): 3 in the last 3600 secs - Wed Apr 29 08:42:22 2015
80.15.154.165 # lfd: (sshd) Failed SSH login from 80.15.154.165 (FR/France/LPuteaux-656-1-278-165.w80-15.abo.wanadoo.fr): 3 in the last 3600 secs - Wed Apr 29 08:47:22 2015
66.205.102.188 # lfd: (sshd) Failed SSH login from 66.205.102.188 (US/United States/host-66-205-102-188.classicnet.net): 3 in the last 3600 secs - Wed Apr 29 08:50:37 2015
43.255.190.116 # lfd: (sshd) Failed SSH login from 43.255.190.116 (HK/Hong Kong/-): 3 in the last 3600 secs - Wed Apr 29 09:04:32 2015
223.203.217.202 # lfd: (sshd) Failed SSH login from 223.203.217.202 (CN/China/-): 3 in the last 3600 secs - Wed Apr 29 09:11:09 2015
74.62.91.31 # lfd: (sshd) Failed SSH login from 74.62.91.31 (US/United States/sis-srv-02.sis98.com): 3 in the last 3600 secs - Wed Apr 29 09:14:17 2015
Web Application Administrator Protection