We see at the moment one UniPager installation with version 0.6.0, that is constantly trying to connect to the DAPNET Node at dapnet.afu.rwth-aachen.de:43434 . In this old version of UniPager, the connect process was not inhibited if no configuration like callsign and auth key was provided after installation. So we are dealing here with a lonely Linux maschine, who's owner has forgotten that she/he installed UniPager and that it is causing 3 log lines every second.
In order to block maschines like these, the firewall at db0sda has been set up in a way, that if either
(RegEx: \[UniPager-.+\ v[0-9]+\.[0-9]+\.[0-9]\ \ \])
then the source IP is added for 10 minutes to a list of blocked IPs.
With this approach, we should be also more save against possible DOS attacks.