I see this as being ripe for abuse provided you can determine which
system(s) are blocking the connections.  Using twitter to enumerate
how they block ssh connection attempts and then working around these.

On Mon, Dec 28, 2009 at 1:12 PM, Scott Webster <[email protected]> wrote:
> Its been running from 10/9/2009, using perl net. And not very productive,
> the times seem random.
>
>
>
> From: [email protected]
> [mailto:[email protected]] On Behalf Of xgermx
> Sent: Monday, December 28, 2009 8:46 AM
> To: PaulDotCom Security Weekly Mailing List
> Subject: [Pauldotcom] http://twitter.com/sotohide_log
>
>
>
> So I was checking some of my web server logs and I ran across an SHH brute
> force attack coming from a Chinese IP. Upon googling the IP I find this
> http://twitter.com/sotohide_log
> Does anyone have any insight?
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to