lfd on xxx.yyy.com: blocked 208.82.108.36 (US/United States/clay.county.health.108.82.208.in-addr.arpa)
Time: Thu Mar 18 05:44:15 2010 +0100
IP: 208.82.108.36 (US/United States/clay.county.health.108.82.208.in-addr.arpa)
Failures: 5 (sshd)
Interval: 300 seconds
Blocked: Permanent Block
Log entries:
Mar 18 05:44:11 hc sshd[8421]: Invalid user tcpdump from 208.82.108.36 Mar 18 05:44:11 hc sshd[8421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.82.108.36 Mar 18 05:44:11 hc sshd[8420]: Invalid user tcpdump from 208.82.108.36 Mar 18 05:44:11 hc sshd[8420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.82.108.36 Mar 18 05:44:12 hc sshd[8418]: Failed password for invalid user tenetko from 208.82.108.36 port 57405 ssh2
I have the same openssh versions as dvk01 on CentOS 5.4 i386; cPanel 11.25.0-C43473; csf v4.99
Have you tried configuring ssh on an alternative port? It sure prevents most drive by brute force scripts to operate.
In our environment we don't even allow ssh unless it is to certain fixed ip addresses (for staff use only).
2k warning emails is alot, almost seems targetted.
Actually I didn't configure ssh on another port because it didn't even came to my mind (yeah, silly of me )
as much as allowing ssh, we use the same policy, but need one server open when we're out of the office. But we can change this. We will just have to connect to our Cisco router with VPN client and go from there