LFD block reports
Posted: 20 Feb 2013, 18:46
My server very rarely sees any dodgy attempts to access it and has been this way for over 6 months since I set it up.
I am a total newbie to all of this so please go easy on me and avoid too much jargon
In the last 48 hours though it's seeing a lot more - and I notice something common to them all, despite them being from all over the world, and trying different ports / accounts.
Here is an example of one:
[align=left]lfd on <MYSERVERNAME>: blocked 173.12.152.114 (US/United States/173-12-152-114-northgulf<DOT>hfc<DOT>comcastbusiness<DOT>net)
2013-02-20 17:50:11 [7017] dovecot_login authenticator failed for 173-12-152-114-northgulf<DOT>hfc<DOT>comcastbusiness<DOT>net ([192.168.2.33]) [173.12.152.114]:2722 I=[<MYSERVERIP>]:25: 535 Incorrect authentication data (set_id=catalog)[/align]
<MYSERVERNAME> = My server's name
<DOT> = . (because I am not allowed to post working URLs)
<MYSERVERIP> = My server's IP
The internal IP shown (which I've bolded) I assume is the IP of the attacker on their own local network?
The odd thing is, in all ~10 failed entry attempts today, and around the same number yesterday, that IP address is _precisely_ the same (192.168.2.33).
Is there some known network exploit that targets that IP or am I looking at the same person/bot trying their thang but routing it all over the world so they can retry.
Can I somehow make a rule to block any attempts which mention that local IP? I figure for 99.9999999% of ordinary people on the web (this is a web server primarily) they will be on 192.168.1.1 style IPs locally (Windows/Linux/Mac standard) so likely that rule won't be an issue perhaps, except for this attacker.
Thank you!!
Bob
I am a total newbie to all of this so please go easy on me and avoid too much jargon
In the last 48 hours though it's seeing a lot more - and I notice something common to them all, despite them being from all over the world, and trying different ports / accounts.
Here is an example of one:
[align=left]lfd on <MYSERVERNAME>: blocked 173.12.152.114 (US/United States/173-12-152-114-northgulf<DOT>hfc<DOT>comcastbusiness<DOT>net)
2013-02-20 17:50:11 [7017] dovecot_login authenticator failed for 173-12-152-114-northgulf<DOT>hfc<DOT>comcastbusiness<DOT>net ([192.168.2.33]) [173.12.152.114]:2722 I=[<MYSERVERIP>]:25: 535 Incorrect authentication data (set_id=catalog)[/align]
<MYSERVERNAME> = My server's name
<DOT> = . (because I am not allowed to post working URLs)
<MYSERVERIP> = My server's IP
The internal IP shown (which I've bolded) I assume is the IP of the attacker on their own local network?
The odd thing is, in all ~10 failed entry attempts today, and around the same number yesterday, that IP address is _precisely_ the same (192.168.2.33).
Is there some known network exploit that targets that IP or am I looking at the same person/bot trying their thang but routing it all over the world so they can retry.
Can I somehow make a rule to block any attempts which mention that local IP? I figure for 99.9999999% of ordinary people on the web (this is a web server primarily) they will be on 192.168.1.1 style IPs locally (Windows/Linux/Mac standard) so likely that rule won't be an issue perhaps, except for this attacker.
Thank you!!
Bob