I run on 22 because other outbound ports are blocked at my place of employment.
My attempts show up in /var/log/auth.log (in Ubuntu). I believe the command I used was `nmap -A -T4 ip.add.re.ss` (it was an example in the man page). Once I noticed the attempts were happening, to block any traffic from them to me, I added the ip address to /etc/hosts.deny, or: `echo "ALL:ip.add.re.ss" >> /etc/hosts.deny` and then reloaded inetd with: `pkill -1 inetd`. I was kind of tempted to create a bunch of accounts using common names and blank passwords and see what would happen if the attempt was successful, but I didn't want to honeypot my main file server. Grant On 11/6/06, Ed Jaeger <[EMAIL PROTECTED]> wrote:
I get them all the time here at the office. Pretty funny list of logins they try - must be a script someone put together. Grant can tell you what he used, but I suspect nmap -O 219.94.133.29 was it. Jeff Shippen wrote: > I used to get such automated attempts every now and then, UNTIL i > changed my ssh listening port number to something other than the default > (22). > To change the default sshd port, edit this file on some (all?) distros: > /etc/ssh/sshd_config. That's where it is on SUSE anyway. > Add a line, "Port 22" where you can replace 22 with any number. > ** > Also, some may not know where to find such attempts. Mine shows up in > /var/log/messages. > > I'm curious, what is the exact command you used (well, the options and > such) with `nmap`? > > Jeff > > Grant Kelly wrote: > >> I noticed someone from 219.94.133.29 scanning my ubuntu box today. >> They were trying to login via SSH from a common list of names. Well, I >> nmap'd em back, here's the results: >> >> Starting Nmap 4.03 ( http://www.insecure.org/nmap/ ) at 2006-11-05 >> 14:18 PST >> Interesting ports on 219.94.133.29: >> (The 1656 ports scanned but not shown below are in state: closed) >> PORT STATE SERVICE VERSION >> 21/tcp open ftp vsftpd 2.0.4 >> 22/tcp open ssh OpenSSH 4.3 (protocol 1.99) >> 23/tcp open telnet Linux telnetd >> 25/tcp open smtp qmail smtpd >> 80/tcp open http Apache httpd 2.2.2 ((Fedora)) >> 110/tcp open pop3 qmail pop3d >> 111/tcp open rpcbind 2 (rpc #100000) >> 135/tcp filtered msrpc >> 136/tcp filtered profile >> 137/tcp filtered netbios-ns >> 138/tcp filtered netbios-dgm >> 139/tcp filtered netbios-ssn >> 443/tcp open ssl/http Apache httpd 2.2.2 ((Fedora)) >> 445/tcp filtered microsoft-ds >> 593/tcp filtered http-rpc-epmap >> 888/tcp open ssl/http 3ware 3DM2 Serial RAID http config 2.0 >> 10000/tcp open http Webmin httpd >> 27374/tcp filtered subseven >> >> Service Info: Hosts: kuroha.net, medxis002.my.domain; OSs: Unix, >> Linux; Device: storage-misc >> >> ------- >> >> So if anyone wants to hack on some webmin, visit: >> https://219.94.133.29:10000/ >> or for some sort of RAID configuration utility, visit: >> https://219.94.133.29:888/ >> >> >> Have fun, >> Grant >> >> _______________________________________________ >> RLUG mailing list >> RLUG@rlug.org >> http://lists.rlug.org/mailman/listinfo/rlug >> > _______________________________________________ > RLUG mailing list > RLUG@rlug.org > http://lists.rlug.org/mailman/listinfo/rlug -- Ed Jaeger
_______________________________________________ RLUG mailing list RLUG@rlug.org http://lists.rlug.org/mailman/listinfo/rlug