Not really a problem to keep adding to the list but obviously this takes some time (administration) and is always reactive!
You should review your management strategy.
Allow Winbox only from inside ?
If over Internet, your remote location/office does not have a STATIC IP so you can build your filter around that ? (and drop every other Winbox attempt)
Changing the default Winbox port probably also reduced “attempts” ALOT
Configure some type op VPN-setup for performing (remote) administration
Configure some “port-knocking” approach so your Winbox port only “opens” after some specific sequenced packets arrived earlier.
hi there, in my opinion, theres many ways to skin this cat . I found this solution some years ago, this should help with your task of manually adding ips.
Add a bunch of filter rules using this as example, just change lte1 to your interface name. Take note the order of these rules are important, the most bottom allows the input, each rule up in the chain will add source ip address to a list that will expire in time, if too many attempts for winbox port from the same ip, the address will be added to a list that doesnt expire, the most top rule will drop incoming requests for that source ip. The lists will be cleared upon reboot, you can modify to make it permanent should you wish. Add these and whatch your Address List grow over a course of a day or 2
#drag these rules right to the top or make sure theres no rule that will take preference over these
This kind of solution is a bit risky.
Lately I have been seeing several incoming port scans where the source address was spoofed to be e.g. 8.8.8.8 or 1.1.1.1 or 1.0.0.1 etc.
These scans apparently assume that you would have some mechanism like that and then those addresses will get added to your blacklist, which in some cases may affect your devices capability to use DNS or whatever source address was spoofed.
When you do something like that, always make sure that your “drop” rules are below the “accept established/related” rule that is normally at the top of the firewall table.
Also, never put those drop rules in the “raw” table.
Then you at least can still do outbound connects to those addresses even when they are in the blacklist for incoming connects.
And of course, in this particular example, do not use interface names in firewall rules. Use the predefined “LAN” and “WAN” interface lists, and put the relevant internet interface in the proper list. (e.g. put lte1 in the WAN list).
ALL of my MikroTik Router clients use MOAB to prevent External Attacks just like the one you describe.
If your MikroTik Router model qualifies for the MOAB service — I provide a 10 day Free Trial of MOAB so that you can see for yourself.
If you are interested see my sig below:
Of course the solutions that @jvanhambelgium presented are much better than such a generic blacklist, that will only help against mass portscanning and not cater for some targeted attack on his router.
for what its worth the rules were incomplete that i posted previously, have added what was missing @jvanhambelgium suggestion is def the best, it should be standard practice when initially configuring