Sorry for the top post,

Setup an iptables based connection limiting rule so that you deny more
than 3 ssh connects per minute from any IP address.

Ther are more intelligent scripts like fail2ban, but I usually find a
simple 2 line iptables connection limiter sufficient to stop bots from
brute forcing your passwords.

Raja


On 07/12/2009, Shrinivasan T <tshriniva...@gmail.com> wrote:
> Hi,
>
> I feel that one of my server is hacked.
>
> "last" says that
> saravana pts/2        78.96.162.69     Thu Dec  3 03:22 - 03:23  (00:00)
>
>
> geoip sites said that.
> IP Address:   78.96.162.69
> Country:      Romania romania
> Country code:         RO (ROU)
> Region:       Vrancea
> City:         Focsani
>
>
> All histories before dec 3 were cleared.
>
> how to find that weather my server is hacked?
> wondering that the cracker could done in a single minute.
>
> need help on hardening the server.
>
> Server is in a remote place.
> I have only ssh access.
>
> how to find that what was happened to my server on dec 3 ?
>
> Thanks in advance.
>
> --
> Regards,
> T.Shrinivasan
>
>
> My experiences with Linux are here
> http://goinggnu.wordpress.com
>
> For Free and Open Source Jobs
> http://fossjobs.wordpress.com
> _______________________________________________
> To unsubscribe, email ilugc-requ...@ae.iitm.ac.in with
> "unsubscribe <password> <address>"
> in the subject or body of the message.
> http://www.ae.iitm.ac.in/mailman/listinfo/ilugc
>


-- 

- Raja
_______________________________________________
To unsubscribe, email ilugc-requ...@ae.iitm.ac.in with 
"unsubscribe <password> <address>"
in the subject or body of the message.  
http://www.ae.iitm.ac.in/mailman/listinfo/ilugc

Reply via email to