Re: Undesired ssh login attempts
- Date: Sun, 10 Jun 2018 14:27:12 +0300
- From: Reco <recoverym4n@xxxxxxxxx>
- Subject: Re: Undesired ssh login attempts
On Sun, Jun 10, 2018 at 12:55:24PM +0200, deloptes wrote:
> I recently get many of those, which means someone found out that ssh
> external is on port 22222 and is trying to do some evil work there.
> Should I worry or do something?
> Similar for apache web server.
You mean that all these connections originate from 184.108.40.206?
"iptables -I INPUT -s 220.127.116.11/29 -j DROP" will take care of it.
While you're at it, write an abuse letter to Jonathan Lamptey - he? owns
problematic IP range according to AFRINIC.
> I think both are secure: for ssh no users with easy password allowed to
If you have password-enabled ssh with stock Ciphers, MACs, and Kex'es
enabled, and your only protection is non-standard ssh port - then you
are doing it wrong.
Set these to /etc/ssh/sshd_config, and watch all those script-kiddies
cry as they won't be able to connect to you at all:
And forbid ssh password authentication. They've invented key-based
authentication for cases like yours 15 years ago.
> and apache - no pages or stuff that would compromise.
As long as this apache serves static HTML only then you're probably safe