You might want to look at disabling root ssh login as a precaution (should
be disabled always on any exposed system), look in /etc/ssh/sshd_config
(typically) for :

PermitRootLogin no

Also you might want to consider using a targetted firewall approach with
something like Fail2Ban which I have found very effective

Martin

On 18 August 2012 18:32, Stuart Bird <e_tect...@yahoo.co.uk> wrote:

> Hi All
>
> Could anyone cast an eye over the following log entries and tell me if
> this is just script kiddie stuff, or whether I should be more concerned?
>
> The entries are from my "auth.log" file on an Ubuntu 12.04 server (vps).
> The server hosts one web site at the moment. It's been up for about three
> months now, but these entries have only started over the last couple of
> days.
>
>  Aug 18 08:05:56 localhost sshd[11478]: Address 94.242.250.53 maps to
> mail.smtpdestek.com, but this does not map back to the address - POSSIBLE
> BREAK-IN ATTEMPT!
> Aug 18 08:05:56 localhost sshd[11478]: pam_unix(sshd:auth): authentication
> failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.242.250.53  user=root
> Aug 18 08:05:58 localhost sshd[11478]: Failed password for root from
> 94.242.250.53 port 47297 ssh2
> Aug 18 08:05:58 localhost sshd[11478]: Received disconnect from
> 94.242.250.53: 11: Bye Bye [preauth]
> Aug 18 08:05:59 localhost sshd[11480]: Address 94.242.250.53 maps to
> mail.smtpdestek.com, but this does not map back to the address - POSSIBLE
> BREAK-IN ATTEMPT!
> Aug 18 08:05:59 localhost sshd[11480]: Invalid user sniff from
> 94.242.250.53
> Aug 18 08:05:59 localhost sshd[11480]: input_userauth_request: invalid
> user sniff [preauth]
> Aug 18 08:05:59 localhost sshd[11480]: pam_unix(sshd:auth): check pass;
> user unknown
> Aug 18 08:05:59 localhost sshd[11480]: pam_unix(sshd:auth): authentication
> failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.242.250.53
> Aug 18 08:06:01 localhost sshd[11480]: Failed password for invalid user
> sniff from 94.242.250.53 port 47551 ssh2
> Aug 18 08:06:01 localhost sshd[11480]: Received disconnect from
> 94.242.250.53: 11: Bye Bye [preauth]
> Aug 18 08:06:01 localhost sshd[11482]: Address 94.242.250.53 maps to
> mail.smtpdestek.com, but this does not map back to the address - POSSIBLE
> BREAK-IN ATTEMPT!
> Aug 18 08:06:01 localhost sshd[11482]: pam_unix(sshd:auth): authentication
> failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.242.250.53  user=root
> Aug 18 08:06:03 localhost sshd[11482]: Failed password for root from
> 94.242.250.53 port 47767 ssh2
> Aug 18 08:06:03 localhost sshd[11482]: Received disconnect from
> 94.242.250.53: 11: Bye Bye [preauth]
> Aug 18 08:06:03 localhost sshd[11484]: Address 94.242.250.53 maps to
> mail.smtpdestek.com, but this does not map back to the address - POSSIBLE
> BREAK-IN ATTEMPT!
> Aug 18 08:06:03 localhost sshd[11484]: Invalid user ranger from
> 94.242.250.53
> Aug 18 08:06:03 localhost sshd[11484]: input_userauth_request: invalid
> user ranger [preauth]
> Aug 18 08:06:03 localhost sshd[11484]: pam_unix(sshd:auth): check pass;
> user unknown
> Aug 18 08:06:03 localhost sshd[11484]: pam_unix(sshd:auth): authentication
> failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.242.250.53
> Aug 18 08:06:05 localhost sshd[11484]: Failed password for invalid user
> ranger from 94.242.250.53 port 47988 ssh2
> Aug 18 08:06:05 localhost sshd[11484]: Received disconnect from
> 94.242.250.53: 11: Bye Bye [preauth]
> Aug 18 08:06:05 localhost sshd[11486]: Address 94.242.250.53 maps to
> mail.smtpdestek.com, but this does not map back to the address - POSSIBLE
> BREAK-IN ATTEMPT!
>
> Any advice appreciated!
>
> Stu
>
>
> _______________________________________________
> Peterboro mailing list
> Peterboro@mailman.lug.org.uk
> https://mailman.lug.org.uk/mailman/listinfo/peterboro
>
_______________________________________________
Peterboro mailing list
Peterboro@mailman.lug.org.uk
https://mailman.lug.org.uk/mailman/listinfo/peterboro

Reply via email to