search for: sshdfilter

Displaying 4 results from an estimated 4 matches for "sshdfilter".

2012 Jan 31
6
Shorewall and sshdfilter
...ish 2 interface will do pretty well plus adding the extra bits to handle the two internet lines on one interface! What a joy that they both have static ip''s! I don''t see any real problems in getting it up and running! Now comes the little problem! I chose many years ago to use sshdfilter because it was the most effective sshd blocker I found! Only suffers from a little problem! It needs a table/chain created call SSHD and then a rule added like this! # patched for sshdfilter /sbin/iptables -I INPUT -p tcp -m tcp --dport 22 -j SSHD The rest of the sshdfilter doing its work of a...
2008 Jul 21
20
Ideas for stopping ssh brute force attacks
...my web server and email box have attempted to ssh'd to using weird names like admin,appuser,nobody,etc.... None of these are valid users. I know that I can block sshd all together with iptables but that will not work for us. I did a little research on google and found programs like sshguard and sshdfilter. Just wanted to know if anyone had any experience with anything like these programs or have any other advice. I really appreciate it. -- Bo Lynch
2009 Mar 24
6
Is there a public blacklist of hackers' IP addresses?
Hi, In last one week I have seen two servers of our organization successfully hacked and some other under attack from some other IP addresses. We would block one IP address on our firewall and after a few hours, they would start getting hits from some another IP address. When I checked them on whois.net, they all were from Amsterdam. Surprisingly, I once had similar attack in the past and it was
2006 Feb 13
11
ssh attack
Hi, I get ssh connect attempts all the time, to my servers at home and at work. I've noticed lately they come from a certain ip address, hitting every 3 or 4 seconds, trying 50 or 100 different user names and passwords. And I get these sweeps from 2 or 3 ip addresses a day. I guess this is an automated attempt to guess a user/pass and break into a system. I tried to secure ssh better by