2011-01-25
Interesting SSH attack from 216.75.199.3 ...
Interesting SSH attack from 216.75.199.33. All attempts for root and the attacker takes fail2ban default settings into account. The attack waits about half an hour when there is no reply.17:14:37.332569 IP 216.75.199.33.56158 > mm.nn.oo.pp.22: S 3208575306:3208575306(0) win 5840 <mss 1380,sackOK,timestamp 2532346093 0,nop,wscale 2> 17:14:40.332240 IP 216.75.199.33.56158 > mm.nn.oo.pp.22: S 3208575306:3208575306(0) win 5840 <mss 1380,sackOK,timestamp 2532349093 0,nop,wscale 2> 17:14:46.332290 IP 216.75.199.33.56158 > mm.nn.oo.pp.22: S 3208575306:3208575306(0) win 5840 <mss 1380,sackOK,timestamp 2532355093 0,nop,wscale 2> 17:47:48.498287 IP 216.75.199.33.3446 > mm.nn.oo.pp.22: S 982440641:982440641(0) win 5840 <mss 1380,sackOK,timestamp 2534337258 0,nop,wscale 2> 17:47:51.497769 IP 216.75.199.33.3446 > mm.nn.oo.pp.22: S 982440641:982440641(0) win 5840 <mss 1380,sackOK,timestamp 2534340258 0,nop,wscale 2> 17:47:57.498146 IP 216.75.199.33.3446 > mm.nn.oo.pp.22: S 982440641:982440641(0) win 5840 <mss 1380,sackOK,timestamp 2534346258 0,nop,wscale 2>Too bad I changed the defaults.