CA3LE Posted October 30, 2004 CID Share Posted October 30, 2004 Someone tried to hack me last night [code:1] Failed logins from these: admin/password from 210.212.161.2: 4 Time(s) guest/password from 210.212.161.2: 2 Time(s) root/password from 202.30.198.226: 18 Time(s) root/password from 210.212.161.2: 6 Time(s) test/password from 210.212.161.2: 13 Time(s) user/password from 210.212.161.2: 2 Time(s) **Unmatched Entries** Illegal user test from 210.212.161.2 Illegal user test from 210.212.161.2 Illegal user test from 210.212.161.2 Illegal user test from 210.212.161.2 Illegal user test from 210.212.161.2 Illegal user test from 210.212.161.2 Illegal user test from 210.212.161.2 Illegal user test from 210.212.161.2 Illegal user test from 210.212.161.2 Illegal user test from 210.212.161.2 Illegal user test from 210.212.161.2 Illegal user guest from 210.212.161.2 Illegal user guest from 210.212.161.2 Illegal user admin from 210.212.161.2 Illegal user admin from 210.212.161.2 Illegal user admin from 210.212.161.2 Illegal user admin from 210.212.161.2 Illegal user user from 210.212.161.2 Illegal user user from 210.212.161.2 Illegal user test from 210.212.161.2 Illegal user test from 210.212.161.2 --------------------- pam_unix Begin ------------------------ sshd: Invalid Users: Unknown Account: 21 Time(s) Authentication Failures: root (202.30.198.226 ): 18 Time(s) root (210.212.161.2 ): 6 Time(s) unknown (210.212.161.2 ): 21 Time(s) ---------------------- pam_unix End ------------------------- [/code:1] Stupid ass --- God what an idiot, guess he took me for granted or thought I wasn't smart enough to log the world... I am really busy right now.. can you guys counter this guy or flood him -- haha no no no I would never condone that kind of behavior... or would I Quote Link to comment Share on other sites More sharing options...
Shug7272 Posted October 30, 2004 CID Share Posted October 30, 2004 Kick his ass sea bass. What a dumbass. I will send him something nice. Quote Link to comment Share on other sites More sharing options...
CA3LE Posted October 30, 2004 Author CID Share Posted October 30, 2004 Quote Link to comment Share on other sites More sharing options...
unstable Posted October 30, 2004 CID Share Posted October 30, 2004 I wouldn't sweat it. My firewall logs at work are insane, I get hammered by tons of port scans etc. It's kind of funny because my logs go: WARNING: no xlate src:outside somehost dst:inside my host Quote Link to comment Share on other sites More sharing options...
Swimmer Posted October 30, 2004 CID Share Posted October 30, 2004 just some dumbass who had to much time on his hands.. Quote Link to comment Share on other sites More sharing options...
CA3LE Posted October 30, 2004 Author CID Share Posted October 30, 2004 yep Quote Link to comment Share on other sites More sharing options...
unstable Posted October 31, 2004 CID Share Posted October 31, 2004 You know, it doesn't take too much ICMP traffic to totally knock someone down. I tested this in a lab one time, just kept launching command line windows sending packets to a particular hosts as big as I could. I tried the same thing in a Cisco lab and some of the routers will actually drop big ICMP packets. Could just make a post "Asshole of the day" Ask people to use ICMP to test to see if he's online. The longer the pings are sent and the bigger the packets...the better. Nothing better than screwing with someones site and then suddenly you start getting popped by about 100 different IP addresses. Quote Link to comment Share on other sites More sharing options...
luwigie Posted October 31, 2004 CID Share Posted October 31, 2004 That's not all that strange... SSH scans happen all the time to my various SSH machines. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.