SCIENTIFIC-LINUX-USERS Archives

February 2015

SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
John Lauro <[log in to unmask]>
Reply To:
John Lauro <[log in to unmask]>
Date:
Mon, 9 Feb 2015 10:50:26 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (33 lines)
Check out https://dshield.org/howto.html for a central place to submit attempts...

Some useful pages:
https://dshield.org/reports.html
https://dshield.org/sources.html

As many sources can be anonymous, it's easy for hosts to be on someones lists from either spoofed or replies to spoofed ips, etc...  and so shouldn't be used as a blacklist, at least not exclusively.  (ie: wouldn't want to block port 80 based on this for a public web server)

----- Original Message -----
> From: "hansel" <[log in to unmask]>
> To: [log in to unmask]
> Sent: Sunday, February 8, 2015 12:41:56 PM
> Subject: Is there any data base collecting data on breakin attempts?
> 
> I accept it as normal many (upwards of several thousand) daily root
> breaking attempts. My defense is careful sshd configuration and
> restrictive incoming router firewall.
> 
> Does anyone mantain a database of consistently offending sites (maybe
> a
> news source, such as politico or propublica)? Initial use of whois
> and dig
> for a few returned familiar countries of origin, coutries that may
> encourage or even sponsor some attempts.
> 
> I searched the archive for "breakin" and "failed" with an without
> subject
> line qualifiers (like "root") and found nothing.
> 
> Thank you.
> mark hansel
> 

ATOM RSS1 RSS2