Re: annoying brute force attack attempt using ssh

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



2008/5/15 Scott van Looy <scott@xxxxxxxxxxx>:
> May 15 12:04:00 novak sshd[21433]: Connection from 193.239.125.119 port
> 54204
> May 15 12:04:01 novak sshd[21433]: Invalid user style from 193.239.125.119
> May 15 12:04:01 novak sshd[21434]: input_userauth_request: invalid user
> style
> May 15 12:04:03 novak sshd[21433]: Failed password for invalid user style
> from 193.239.125.119 port 54204 ssh2
> May 15 12:04:03 novak sshd[21434]: Received disconnect from 193.239.125.119:
> 11: Bye Bye
>
>
> Lots and lots. Around 1 every 5 seconds.
>
> So I ran
> iptables -A INPUT -s 193.239.125.119 -j DROP
> and was surprised to see them attacks continue
> Ran iptables -L just to make sure my rule was there and it was
> in the end had to use hosts.deny to block the IP
>
> Anyone got any ideas why?

What about policy at INPUT ?


-- 
Łukasz Jagiełło
lukasz<at>jagiello<dot>org

-- 
fedora-list mailing list
fedora-list@xxxxxxxxxx
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list

[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux