LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-04-2008, 11:14 AM   #1
pwalden
Member
 
Registered: Jun 2003
Location: Washington
Distribution: Raspbian, Ubuntu, Chrome/Crouton
Posts: 374

Rep: Reputation: 50
Interesting denyhosts log


I added denyhosts a month ago to assist with the frequent ssh probes I was getting. The list below is interesting and yet not that surprising. I used whois to determine country. In two cases the IP came from presumably legitimate company networks with US headquarters.

My server is not a well known IP. The IP is an ISP dynamically allocated IP address and behind a Linksys NAT router/firewall. In addition, the server is up only 12 hours a day during the US day time hours. So these guys must really be looking hard everywhere all the time.
  • China 5
  • Korea 2
  • Japan 2
  • Poland 1
  • Mexico 1
  • India 1
  • Brazil 1
  • Inforte Corp 1
  • Eclipse Marketing 1
 
Old 03-04-2008, 12:12 PM   #2
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
My server is not a well known IP. The IP is an ISP dynamically allocated IP address
I've honestly never heard of SSH scanbots targeting non-dynamic IPs, so I don't see how this would make any difference.

Quote:
In addition, the server is up only 12 hours a day during the US day time hours. So these guys must really be looking hard everywhere all the time.
Yes, the login attempts you are experiencing are almost certainly the direct result of intel provided by automated and randomized recon. And yes, IPs are getting scanned worldwide 24/7 - there's nowhere to hide. BTW, these "guys" could very well be sound asleep in mom's basement while their bots have you under attack.

Quote:
  • China 5
  • Korea 2
  • Japan 2
  • Poland 1
  • Mexico 1
  • India 1
  • Brazil 1
  • Inforte Corp 1
  • Eclipse Marketing 1
Keep in mind that the boxes being used to attack you are very likely to be part of "presumably legitimate networks", and they've simply been owned. In such cases you wouldn't really have any idea where the master node is with this information you have. My point being that this country-breakdown thing can be something cute to show your boss but it doesn't really mean much otherwise, unless you are someone who likes to collect statistics for this kind of stuff.

Last edited by win32sux; 03-04-2008 at 12:23 PM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Any advice on denyhosts for SuSE 10.2? dougnc Linux - Software 6 02-05-2008 07:15 AM
Slight Denyhosts problem C-Sniper Linux - Security 3 01-27-2008 07:12 PM
Postfix, tcpwrappers, denyhosts Posterboy Ubuntu 2 08-27-2007 10:20 AM
LXer: Securing SSH Using Denyhosts LXer Syndicated Linux News 0 08-26-2007 04:30 PM
Logwatch Filter for DenyHosts - Getting Error rustyz82 Linux - Software 1 08-07-2006 07:52 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:53 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration