On Sun, 2006-02-12 at 04:39, Playnet wrote:
Hello FreeBSD,
I see many records as
Feb 10 21:08:55 sstand sshd[84600]: Failed password for root from
61.218.130.20 port 46356 ssh2
How can i block these IP, who try root as login?
Have any soft in ports?
In the default setup of SSH, root
Robert Slade wrote:
On Sun, 2006-02-12 at 04:39, Playnet wrote:
Hello FreeBSD,
I see many records as
Feb 10 21:08:55 sstand sshd[84600]: Failed password for root from 61.218.130.20
port 46356 ssh2
How can i block these IP, who try root as login?
Have any soft in ports?
In the default
lars wrote:
Either you
1configure SSH to only allow logins from certain hostnames or
IP addresses or for certain users, and/or
2install a program to watch your logfiles and modify
your firewall rules dynamically according to specified
triggers,
like
This last week the subject of failed ssh logins was covered in 2
different threads and was answered in full. Please check the
archives for your answers before asking the same question over
again.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Playnet
Sent:
I see many records as
Feb 10 21:08:55 sstand sshd[84600]: Failed password for root from 61.218.130.20
port 46356 ssh2
How can i block these IP, who try root as login?
Have any soft in ports?
There are some ports that do it. One thing I didn't like about the ports
(at least the ones I