[ale] [OT] Chinese brute-force network?

Horkan Smith ale at horkan.net
Thu May 29 16:51:48 EDT 2014


root at system1:/var/log# zgrep -c 116.10.191 auth*
auth.log:204
auth.log.1:161
auth.log.2.gz:461
auth.log.3.gz:876
auth.log.4.gz:332

root at system2:/var/log# zgrep -c 116.10.191 auth*
auth.log:264
auth.log.1:479
auth.log.2.gz:691
auth.log.3.gz:477
auth.log.4.gz:365

root at system3:/var/log# zgrep -c 116.10.191 auth*
auth.log:630
auth.log.1:1177
auth.log.2.gz:684
auth.log.3.gz:261
auth.log.4.gz:316

Logs are rotated once a week; fail2ban and/or denyhosts active on all hosts.

later!
   horkan

On Thu, May 29, 2014 at 04:03:17PM -0400, Dustin Strickland wrote:
> I usuallly don't do this, but I feel oddly compelled to ask. Over the
> past 3 days(and perhaps longer than that, but my logs were wiped on a
> reboot) I've been getting failed SSH login attempts in my logs from a
> bunch of different IPs in the range 116.10.191.1-254. I thought this
> was really unusual; typically, you'll get a few attempts over the
> course of 15 minutes to a few hours from ONE IP, but this has been going
> on steady for days. After researching a bit to try to find who owns this
> network, I found this:
> http://bannedhackersips.blogspot.com/2014/05/fail2ban-ssh-banned-11610191211_7510.html
> 
> `grep 116.10.191. /var/log/auth.log -c` returns 2920. Can you guys
> check your logs and post the results(and specultation)? Something isn't
> right about this, I think.
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists at
> http://mail.ale.org/mailman/listinfo

-- 
Horkan Smith
678-777-3263 cell, ale at horkan.net


More information about the Ale mailing list