1) spin up a fresh VPS on a new-to-me IP#2) log in for the first time3) Notice that "there have been 108 failed login attempts"4) `tail -f /var/log/secure` and watch the attempts roll in5) wonder how that can possibly be a profitable criminal endeavor
-
1) spin up a fresh VPS on a new-to-me IP#
2) log in for the first time
3) Notice that "there have been 108 failed login attempts"
4) `tail -f /var/log/secure` and watch the attempts roll in
5) wonder how that can possibly be a profitable criminal endeavor -
1) spin up a fresh VPS on a new-to-me IP#
2) log in for the first time
3) Notice that "there have been 108 failed login attempts"
4) `tail -f /var/log/secure` and watch the attempts roll in
5) wonder how that can possibly be a profitable criminal endeavor6) peep results of `fail2ban status sshd`
AFAIK there's no way for these botnet attempts to succeed with password auth into an sshd that is configured to not to accept it so it's a waste of everyone's resources.
I should probably just insta-ban any IP that attempts password auth over ssh.
-
undefined Oblomov ha condiviso questa discussione