Break-in Attempts

Federico Voges ftc
Sun Jan 8 20:01:34 PST 2006


A. Khattri wrote:
> On Sun, 8 Jan 2006, Kurt Wall wrote:
>
>   
>> And 2504 of these:
>>
>> sshd[24075]: Failed password for nobody from 220.163.44.81 port 49155 ssh2
>> sshd[24079]: Failed password for invalid user patrick from 220.163.44.81 port 49195 ssh2
>> sshd[24083]: Failed password for invalid user patrick from 220.163.44.81 port 49225 ssh2
>>     
>
> I run denyhosts on my boxes to thwart these:
> http://denyhosts.sourceforge.net/
>
>
>   
I use a quick & dirty script on my hosting server. But denyhosts looks 
very promising. I've already installed it on my home server (already 
blocked some IPs)..

Thanks for the tip :)

-- 
Federico Voges.

Running: Mac OS X 10.4.3 (build 8F46)
Kernel:  8.3.0 Power Macintosh
Procesor: PowerPC G4 @ 1.67GHz
Uptime:  23:51  up  5:43, 2 users, load averages: 1.43 1.60 1.73


-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.linux-sxs.org/pipermail/linux-users/attachments/20060109/9645a5d4/attachment-0001.htm


More information about the Linux-users mailing list