sorta what I figured, but it was a pretty half assed attempt. :P

on a side note, are these typically worth reporting to the ISP of the 
attacker? I tried doing a DNS lookup on the box in question, but it 
doesn't seem to have an FDQN registered. What's the best way to figure 
out the admin for a subnet from a machine's IP?

Thanks,
Steve

shiftee wrote:
> It just looks like someone is trying to brute-force an account, I'm
> sure there are plenty of places that provide tools for this.
> 
> Just make sure you enforce secure passwords, and keep an eye on your
> syslog.
> 
> On Sun, Mar 24, 2002 at 07:11:25AM -0800, Stephen Hassard wrote:
> 
>>Hi there,
>>
>>I found these in my event log from yesterday:
>>
>> >>>
>>Mar 23 09:33:16 www sshd[10998]: input_userauth_request: illegal user www
>>Mar 23 09:33:18 www sshd[10998]: Failed none for illegal user www from 
>>213.26.96.103 port 2276 ssh2
>>Mar 23 09:33:18 www sshd[10998]: Failed keyboard-interactive for illegal 
>>user www from 213.26.96.103 port 2276 ssh2
>>Mar 23 09:33:18 www sshd[10998]: Failed password for illegal user www 
>>from 213.26.96.103 port 2276 ssh2
>>Mar 23 09:33:19 www sshd[10997]: input_userauth_request: illegal user oracle
>>Mar 23 09:33:19 www sshd[10997]: Failed none for illegal user oracle 
>>from 213.26.96.103 port 2275 ssh2
>>Mar 23 09:33:19 www sshd[10997]: Failed keyboard-interactive for illegal 
>>user oracle from 213.26.96.103 port 2275 ssh2
>>Mar 23 09:33:19 www sshd[10997]: Failed password for illegal user oracle 
>>from 213.26.96.103 port 2275 ssh2
>>Mar 23 09:33:19 www sshd[10999]: input_userauth_request: illegal user test
>>Mar 23 09:33:19 www sshd[10999]: Failed none for illegal user test from 
>>213.26.96.103 port 2277 ssh2
>>Mar 23 09:33:19 www sshd[10999]: Failed keyboard-interactive for illegal 
>>user test from 213.26.96.103 port 2277 ssh2
>>Mar 23 09:33:20 www sshd[10999]: Failed password for illegal user test 
>>from 213.26.96.103 port 2277 ssh2
>><<<
>>
>>It seems that from the timestamp that it's most likely a script kiddy; 
>>The time duration beween failed password attempts seems really short. 
>>I'm just wonder if anyone's seen a script that does this and is 
>>available widely, or is it a good chance that I've got someone trying to 
>>break in? None of my other services seem to have been probed, just ssh.
>>
>>Thanks,
>>Steve
>>
>>
>>-- 
>>To UNSUBSCRIBE, email to [EMAIL PROTECTED]
>>with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 
> 



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to