Break-in Attempts
Federico Voges
ftc
Sun Jan 8 20:01:34 PST 2006
A. Khattri wrote:
> On Sun, 8 Jan 2006, Kurt Wall wrote:
>
>
>> And 2504 of these:
>>
>> sshd[24075]: Failed password for nobody from 220.163.44.81 port 49155 ssh2
>> sshd[24079]: Failed password for invalid user patrick from 220.163.44.81 port 49195 ssh2
>> sshd[24083]: Failed password for invalid user patrick from 220.163.44.81 port 49225 ssh2
>>
>
> I run denyhosts on my boxes to thwart these:
> http://denyhosts.sourceforge.net/
>
>
>
I use a quick & dirty script on my hosting server. But denyhosts looks
very promising. I've already installed it on my home server (already
blocked some IPs)..
Thanks for the tip :)
--
Federico Voges.
Running: Mac OS X 10.4.3 (build 8F46)
Kernel: 8.3.0 Power Macintosh
Procesor: PowerPC G4 @ 1.67GHz
Uptime: 23:51 up 5:43, 2 users, load averages: 1.43 1.60 1.73
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.linux-sxs.org/pipermail/linux-users/attachments/20060109/9645a5d4/attachment-0001.htm
More information about the Linux-users
mailing list