> In that case, the best thing you can do is figure out the IP ranges of 
> either location.

Definately a good idea, thanks Eric. 

 
> Btw. I found two articles on securityfocus.com, the first is analysis 
> using a honeypot, as you see these attacks are pretty lame:
 
> http://www.symantec.com/connect/articles/analyzing-malicious-ssh-login-attempts
 
> Then somebody having to respond, because security was pretty lame:
 
> http://www.symantec.com/connect/articles/responding-brute-force-ssh-attack?ref=rss
 
Thanks for posting those links, interesting information there. 

   Jamie
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[email protected]"

Reply via email to