How to view Nextcloud's Brute Force Attempts Table

From steamWiki
Revision as of 10:14, 9 July 2019 by Sean (talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Nextcloud includes "Brute Force" protection. Basically, if a user enters the wrong password too many times then their IP address is throttled.

This quick how to describes how to view the list of IP addresses that have been added to Nextcloud's Brute Force Attempts table.

  1. ssh into your Nextcloud Server: ssh user@nextcloudserver
  2. get into your mysql client: sudo mysql (you may need to use something like sudo -u USER -p PASSWORD -h HOSTNAME)
  3. list the databases: show databases;
  4. select the Nextcloud database: user nextcloud_db;
  5. list tables in the database: show tables;
  6. list all lines in the oc_bruteforce_attempts table: select * from oc_bruteforce_attempts;

Note that if you are behind a Reverse Proxy you may see that all of the entries are the same and they're all the IP of your Reverse Proxy server. If this is the case you have 2 options:

  1. Update your Reverse Proxy server to pass the client's IP to Nextcloud
  2. Whitelist your Reverse Proxy's IP (effectively eliminating Nextcloud's Brute Force protections) by installing the Nextcloud App Brute-force settings