[SLUG] Son of a dog...

From: Chuck Hast (wchast@gmail.com)
Date: Fri Jul 15 2005 - 01:04:13 EDT


I was looking at my log files and see line after line of attempts to get in
my machine. Here is some examples.

65 port 41811 ssh2
Jul 1 21:54:28 fpac-dev sshd[12883]: Illegal user administrator from
219.198.120.65
Jul 1 21:54:28 fpac-dev sshd[12883]: (pam_unix) check pass; user unknown
Jul 1 21:54:28 fpac-dev sshd[12883]: (pam_unix) authentication
failure; logname= uid=0 euid=
0 tty=NODEVssh ruser= rhost=yahoobb219198120065.bbtec.net
Jul 1 21:54:29 fpac-dev sshd[12883]: Failed password for illegal user
administrator from 219
.198.120.65 port 42123 ssh2
Jul 1 21:54:32 fpac-dev sshd[12885]: Illegal user info from 219.198.120.65
Jul 1 21:54:32 fpac-dev sshd[12885]: (pam_unix) check pass; user unknown
Jul 1 21:54:32 fpac-dev sshd[12885]: (pam_unix) authentication
failure; logname= uid=0 euid=
0 tty=NODEVssh ruser= rhost=yahoobb219198120065.bbtec.net
Jul 1 21:54:34 fpac-dev sshd[12885]: Failed password for illegal user
info from 219.198.120.
65 port 42426 ssh2

The last one that I show you up there I can test with host, who do I get in
contact with to complain about this? Or is it worth it?

-- 
Chuck Hast 
To paraphrase my flight instructor;
"the only dumb question is the one you DID NOT ask resulting in my going
out and having to identify your bits and pieces in the midst of torn
and twisted metal."

----------------------------------------------------------------------- This list is provided as an unmoderated internet service by Networked Knowledge Systems (NKS). Views and opinions expressed in messages posted are those of the author and do not necessarily reflect the official policy or position of NKS or any of its employees.



This archive was generated by hypermail 2.1.3 : Fri Aug 01 2014 - 17:42:21 EDT