Douglas Muth on 7 Jun 2012 18:10:55 -0700 |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: [PLUG] SSH brute force attacks using PlcmSpIp |
On Thu, Jun 7, 2012 at 9:09 PM, JP Vossen <jp@jpsdomain.org> wrote: > May be of special interest to VoIP folks... > > Today a non-public server I manage on a Comcast residential DHCP IP in NJ > saw a small SSH brute-force attack from Virpus Networks. My own Linode > hosted server was also attacked by them in Jan & Feb from 50.115.166.129 and > 50.115.166.147. Today's attack was from 50.115.168.188. > Might be a good time for fail2ban. I think the default is 6 invalid password attempts before an iptables rule is written that drops everything that IP. -- Doug ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug