benchea dan

Results 9 comments of benchea dan

Hi, I don't have this problem. prt scrn from non-superadmin ![image](https://user-images.githubusercontent.com/30780133/159215805-e8a3e1c5-a085-4336-9b77-b4c9a6f16dc1.png)

@frankofno Do you have errors in logs?

Do you think it is not the best approach? Should I close the pull request?

> I am the opposite. I prefer ssh+grep+less to look at logs. I know logs can be large, and having something split them up to new files and download manually...

If you don't have Zend installed ( for the client-side), you can send a simple XML request with specific arguments. For login, you need to send an xml as follow...

> So, this seems like a task for dnsdist. We just had multiple attacks today and were able to whip up a first reasonable defense using this: > > ```...

Hi, Do you have solved this?

I think this is because you don t have rows in the traps table. in /var/www/php-snmptraps/app/host/index.php $unique_hosts will be ![image](https://user-images.githubusercontent.com/30780133/174604197-c087c0fb-23e1-443f-b2d1-e0bc7ea97da5.png) and fetch_unique_hosts ![image](https://user-images.githubusercontent.com/30780133/174604319-13481217-6128-44e7-b4e9-a8582019d524.png)

HI, You can have something like this in nginx conf. ``` http { geo $white_user { default 0; 1.2.3.4/32 1; 4.3.2.1/32 1; 192.168.0.0/16 1; } server { ... js_challenge on;...