I see this as being ripe for abuse provided you can determine which system(s) are blocking the connections. Using twitter to enumerate how they block ssh connection attempts and then working around these.
On Mon, Dec 28, 2009 at 1:12 PM, Scott Webster <[email protected]> wrote: > Its been running from 10/9/2009, using perl net. And not very productive, > the times seem random. > > > > From: [email protected] > [mailto:[email protected]] On Behalf Of xgermx > Sent: Monday, December 28, 2009 8:46 AM > To: PaulDotCom Security Weekly Mailing List > Subject: [Pauldotcom] http://twitter.com/sotohide_log > > > > So I was checking some of my web server logs and I ran across an SHH brute > force attack coming from a Chinese IP. Upon googling the IP I find this > http://twitter.com/sotohide_log > Does anyone have any insight? > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com > _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
