RE: MORE SSH Hacking: heads-up

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



>>On Mon, 02 Aug 2004 12:21:01 -0700, Ow Mun Heng <Ow.Mun.Heng@xxxxxxx> wrote:
>
>>This was in my logs last night at 11.56pm.
>
>
>Aug  2 03:21:18 ciscy sshd[27030]: Failed password for illegal user test from
>::ffff:69.59.166.236 port 41532 ssh2
>Aug  2 03:21:21 ciscy sshd[27032]: Failed password for illegal user guest from
>::ffff:69.59.166.236 port 41714 ssh2
>
>Seems to be coming from San Fransisco...
>
>tracert 69.59.166.236
>
>  [snip]
>
>  8    74 ms    71 ms    70 ms  so-10-0.ipcolo1.SanFranciso1.Level3.net
>[4.68.112.234]
>  9    73 ms    72 ms    70 ms  unknown.Level3.net [63.211.150.226]
> 10    74 ms    72 ms    72 ms  border1-ge0-0-0.sfo.servepath.net
>[209.213.192.123]
> 11    76 ms    72 ms    72 ms  border-core1-pos0-1.sfo2.servepath.net
>[216.93.189.34]
> 12    75 ms    71 ms    72 ms  access1-ge0-1-5.sfo2.servepath.net
>[69.59.136.50]
> 13    75 ms    71 ms    72 ms  customer-reverse-entry.69.59.166.236
>[69.59.166.236]
>
>
>--
>   Steve
>   
>
The fact that a user and password is getting flagged indicates that the
hacker is getting past your /etc/hosts.deny file.  I keep my ssh access
shut down except for IP address ranges I am expecting.  I realize this is
not possible in all cases, but stopping the hacker before they get a login
prompt is in my opinion a preferred situation.



[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux