• Login
  • Register
  • Login Register
    Login
    Username/Email:
    Password:
    Or login with a social network below
  • Forum
  • Website
  • GitHub
  • Status
  • Translation
  • Features
  • Team
  • Rules
  • Help
  • Feeds
User Links
  • Login
  • Register
  • Login Register
    Login
    Username/Email:
    Password:
    Or login with a social network below

    Useful Links Forum Website GitHub Status Translation Features Team Rules Help Feeds
    Jellyfin Forum Off Topic Self-hosting & Homelabs [WARN] GER IP potentially looking to exploit public facing Jellyfin-Instances

     
    • 0 Vote(s) - 0 Average

    [WARN] GER IP potentially looking to exploit public facing Jellyfin-Instances

    PSA for Jellyfin Server Admins, look in your Logs if you're seeing the IP / IP-Range 2.201.178.129 & 77.22.40.249
    leucht
    Offline

    Junior Member

    Posts: 1
    Threads: 1
    Joined: 2023 Dec
    Reputation: 1
    #1
    2025-08-12, 11:27 AM (This post was last modified: 2025-08-12, 04:06 PM by leucht. Edited 3 times in total.)
    (Will update if I see more unique adresses)

    Been hosting my Jellyfin-Instance publicly for a while now and been seeing a potential exploitation attempt since late yesterday. 2 IPs / IP-Ranges have been specifically targeting the active Jellyfin-Instances.

    My infrastructure is hosted through Cloudflare (without Proxy since it's against TOS) with Traefik + Crowdsec + GeoIPBlock at the edge. All incoming traffic from outside a certain list countries is blocked. 
    Since late yesterday I saw multiple german IPs / IP-Ranges first & second continuously looking at 3 different directories of my public facing Jellyfin Server:

    System/Info/Public
    Users/Me (gets 401)
    Branding/Configuration

    The crawler seem to check for Instances that have not completed the full setup process or might try to scan for servers running vulnerable versions of Jellyfin. 

    Please be aware and check your logs regularly if you are hosting publicly facing instances. Better yet put them behind a VPN like Tailscale or Zerotier if you got the chance and keep your server up to date.

    Cheers
    1
    « Next Oldest | Next Newest »

    Users browsing this thread: 1 Guest(s)


    Messages In This Thread
    [WARN] GER IP potentially looking to exploit public facing Jellyfin-Instances - by leucht - 2025-08-12, 11:27 AM

    • View a Printable Version
    • Subscribe to this thread
    Forum Jump:

    Home · Team · Help · Contact
    © Designed by D&D - Powered by MyBB
    L


    Jellyfin

    The Free Software Media System

    Linear Mode
    Threaded Mode