Examples from hosts.deniedssh
I seem to be on the receiving end of a concerted series of unsuccessful break 
in attacks on one of our systems. One small part of the attack has  resulted 
in over 2000 entries in our hosts.deniedssh file in less than 1 hour. 

I would be interested in any comments on the small example shown below and any 
advice.

Thanks in advance

David
r200-40-132-245.static.adinet.com.uy
mail.munisanmiguel.gob.pe
port-83-236-241-198.static.qsc.de
pd95b50ce.dip0.t-ipconnect.de
v32641.1blu.de
dubovik.net
r200-40-132-245.static.adinet.com.uy
mail.munisanmiguel.gob.pe
port-83-236-241-198.static.qsc.de
pd95b50ce.dip0.t-ipconnect.de
v32641.1blu.de
dubovik.net
r200-40-132-245.static.adinet.com.uy
mail.munisanmiguel.gob.pe
port-83-236-241-198.static.qsc.de
pd95b50ce.dip0.t-ipconnect.de
v32641.1blu.de
dubovik.net
r200-40-132-245.static.adinet.com.uy
mail.munisanmiguel.gob.pe
port-83-236-241-198.static.qsc.de
pd95b50ce.dip0.t-ipconnect.de
v32641.1blu.de
dubovik.net
r200-40-132-245.static.adinet.com.uy
mail.munisanmiguel.gob.pe
port-83-236-241-198.static.qsc.de
pd95b50ce.dip0.t-ipconnect.de
v32641.1blu.de
dubovik.net
r200-40-132-245.static.adinet.com.uy
mail.munisanmiguel.gob.pe
port-83-236-241-198.static.qsc.de
pd95b50ce.dip0.t-ipconnect.de
v32641.1blu.de
dubovik.net
r200-40-132-245.static.adinet.com.uy
mail.munisanmiguel.gob.pe
port-83-236-241-198.static.qsc.de
pd95b50ce.dip0.t-ipconnect.de
v32641.1blu.de
dubovik.net
r200-40-132-245.static.adinet.com.uy
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "freebsd-questions-unsubscr...@freebsd.org"

Reply via email to