2008/5/15 Scott van Looy <scott@xxxxxxxxxxx>: > May 15 12:04:00 novak sshd[21433]: Connection from 193.239.125.119 port > 54204 > May 15 12:04:01 novak sshd[21433]: Invalid user style from 193.239.125.119 > May 15 12:04:01 novak sshd[21434]: input_userauth_request: invalid user > style > May 15 12:04:03 novak sshd[21433]: Failed password for invalid user style > from 193.239.125.119 port 54204 ssh2 > May 15 12:04:03 novak sshd[21434]: Received disconnect from 193.239.125.119: > 11: Bye Bye > > > Lots and lots. Around 1 every 5 seconds. > > So I ran > iptables -A INPUT -s 193.239.125.119 -j DROP > and was surprised to see them attacks continue > Ran iptables -L just to make sure my rule was there and it was > in the end had to use hosts.deny to block the IP > > Anyone got any ideas why? What about policy at INPUT ? -- Łukasz Jagiełło lukasz<at>jagiello<dot>org -- fedora-list mailing list fedora-list@xxxxxxxxxx To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list