LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 12-17-2018, 12:22 AM   #1
hack3rcon
Senior Member
 
Registered: Jan 2015
Posts: 1,432

Rep: Reputation: 11
Post Does anyone has tried to enter my system?


Hello.
When I see "auth.log" and "ufw.log" files, then it show me below information:
Code:
# tail auth.log
Dec 16 22:04:57 ubuntu sshd[9098]: Failed password for root from 172.20.1.254 port 55292 ssh2
Dec 16 22:05:06 ubuntu sshd[9098]: Failed password for root from 172.20.1.254 port 55292 ssh2
Dec 16 22:05:06 ubuntu sshd[9098]: error: maximum authentication attempts exceeded for root from 172.20.1.254 port 55292 ssh2 [preauth]

# tail ufw.log
Dec 16 22:05:00 ubuntu kernel: [860180.320154] [UFW BLOCK] IN=ens160 OUT= MAC=XXXX SRC=172.20.1.254 DST=172.20.100.62 LEN=40 TOS=0x00 PREC=0x00 TTL=228 ID=37021 PROTO=TCP SPT=58292 DPT=6609 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 16 22:05:26 ubuntu kernel: [860206.710710] [UFW BLOCK] IN=ens160 OUT= MAC=XXXX SRC=172.20.1.254 DST=172.20.100.62 LEN=40 TOS=0x00 PREC=0x00 TTL=226 ID=17895 PROTO=TCP SPT=55074 DPT=48000 WINDOW=1024 RES=0x00 SYN URGP=0
Can it mean someone from "172.20.1.254" IP tried to logging into "172.20.100.62" IP?

Thank you.
 
Old 12-17-2018, 12:35 AM   #2
scasey
LQ Veteran
 
Registered: Feb 2013
Location: Tucson, AZ, USA
Distribution: CentOS 7.9.2009
Posts: 5,727

Rep: Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211
Yup. That’s what it means. Note that both of those IP addresses are private addresses, so whatever’s going on is happening inside your network.
 
4 members found this post helpful.
Old 12-17-2018, 04:15 AM   #3
TenTenths
Senior Member
 
Registered: Aug 2011
Location: Dublin
Distribution: Centos 5 / 6 / 7
Posts: 3,475

Rep: Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553
Quote:
Originally Posted by scasey View Post
Yup. That’s what it means. Note that both of those IP addresses are private addresses, so whatever’s going on is happening inside your network.
Given that the source address ends in .254 this is most likely the router and it's doing inbound NAT.
 
4 members found this post helpful.
Old 12-18-2018, 07:39 AM   #4
hack3rcon
Senior Member
 
Registered: Jan 2015
Posts: 1,432

Original Poster
Rep: Reputation: 11
Yes, The .254 IP is firewall and .62 is my server. The attacker IP is my firewall IP because someone wanted to attack to my server from outside of network?
 
Old 12-18-2018, 08:07 AM   #5
TenTenths
Senior Member
 
Registered: Aug 2011
Location: Dublin
Distribution: Centos 5 / 6 / 7
Posts: 3,475

Rep: Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553
Yes
 
1 members found this post helpful.
Old 12-18-2018, 09:31 PM   #6
frankbell
LQ Guru
 
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,321
Blog Entries: 28

Rep: Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141
Note that the attempt may not be directed at you.

In fact, it probably isn't directed at you. Random port scans have been a thing on the internet almost since the internet became widely available.

Last edited by frankbell; 12-18-2018 at 09:34 PM.
 
2 members found this post helpful.
Old 12-21-2018, 01:26 AM   #7
hack3rcon
Senior Member
 
Registered: Jan 2015
Posts: 1,432

Original Poster
Rep: Reputation: 11
Quote:
Originally Posted by TenTenths View Post
Yes
For find attacker IP, must I check Firewall log?
 
Old 12-21-2018, 05:42 AM   #8
TenTenths
Senior Member
 
Registered: Aug 2011
Location: Dublin
Distribution: Centos 5 / 6 / 7
Posts: 3,475

Rep: Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553
Quote:
Originally Posted by hack3rcon View Post
For find attacker IP, must I check Firewall log?
Yes
 
Old 12-21-2018, 10:20 AM   #9
scasey
LQ Veteran
 
Registered: Feb 2013
Location: Tucson, AZ, USA
Distribution: CentOS 7.9.2009
Posts: 5,727

Rep: Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211
Quote:
Originally Posted by hack3rcon View Post
For find attacker IP, must I check Firewall log?
I have to wonder why you just didn't check the firewall log to see instead of asking this question?
 
1 members found this post helpful.
Old 12-22-2018, 02:30 PM   #10
hack3rcon
Senior Member
 
Registered: Jan 2015
Posts: 1,432

Original Poster
Rep: Reputation: 11
Quote:
Originally Posted by scasey View Post
I have to wonder why you just didn't check the firewall log to see instead of asking this question?
Because I have not access to the firewall.
 
Old 12-22-2018, 04:34 PM   #11
scasey
LQ Veteran
 
Registered: Feb 2013
Location: Tucson, AZ, USA
Distribution: CentOS 7.9.2009
Posts: 5,727

Rep: Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211
Quote:
Originally Posted by hack3rcon View Post
Because I have not access to the firewall.
Interesting. If you don't have access to the firewall, who does? The sysadmin?
If you have a sysadmin for your system, you should be talking to them...
 
Old 12-23-2018, 03:37 AM   #12
hack3rcon
Senior Member
 
Registered: Jan 2015
Posts: 1,432

Original Poster
Rep: Reputation: 11
Quote:
Originally Posted by scasey View Post
Interesting. If you don't have access to the firewall, who does? The sysadmin?
If you have a sysadmin for your system, you should be talking to them...
Yes.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Has anyone heard of ROBOLINUX? I tried going there but no replies from anyone rusty377 Linux - Newbie 14 07-21-2018 08:54 AM
Does anyone ever tried to git the / and manage system or other things with it ? Linux.tar.gz Linux - General 4 04-29-2015 10:46 AM
"Enter Key" not working, how to map "Enter Key" functionality to "F9" Key srinihi Linux - Newbie 1 04-03-2009 02:46 PM
How can I enter php interface like "python[enter]" in python backpacker Linux - Software 1 06-20-2005 07:38 PM
"Disk boot failure. Enter system disk and press enter" Fear58 Linux - Hardware 3 06-25-2004 05:17 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 05:35 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration