jwildeboer, (edited )
@jwildeboer@social.wildeboer.net avatar

And another little attack wave on my mail server. The screenshot shows the number of failed attempts to post spam per IP (99% refused by my mail server because the hostname was fake). Now all blocked with #crowdsec for a few days.

jwildeboer,
@jwildeboer@social.wildeboer.net avatar

As you can see, the attacking IP addresses try continuously to flood my mail server. Compare that to the attempts to brute-force SASL logins, which are just 1 try per IP, indicating these attacks come from a botnet.

jwildeboer,
@jwildeboer@social.wildeboer.net avatar

The brute-force SSH login attempts are, like the spam attempts, coming from longer running scripts on typically cheap VPSes that run until someone notices and shuts them down (or not. some hosting companies don't give a sh*it about such abuse)

DrWhoZee,
@DrWhoZee@troet.cafe avatar

@jwildeboer I moved the SSH port to something unusual, that got rid of the SSH spam. One less thing to look at.

jwildeboer,
@jwildeboer@social.wildeboer.net avatar

deleted_by_author

  • Loading...
  • DrWhoZee,
    @DrWhoZee@troet.cafe avatar

    @jwildeboer ah, ok. Guess I had the more dumb ones. Evolution‘s a bitch.

    stacey_campbell,
    @stacey_campbell@aus.social avatar

    @jwildeboer I always ponder what their reaction would be if they were to finally gain access to the crappy little Raspberry Pi waiting for them on the other side of the non-standard ssh port at my house. Presumably extreme disappointment.

    scips,

    @jwildeboer I use:

    sudo iptables -N attacks; iptables -A INPUT -i eth0 -p tcp --dport 22 -m state --state NEW -m recent --update --seconds 60 --hitcount 8 --rttl --name SSH -j attacks; iptables -A attacks -j LOG --log-prefix "FW_DROPPED: "; iptables -A attacks -j DROP

    Any better way to drop them?

    ERDonnachie,

    deleted_by_author

  • Loading...
  • jwildeboer,
    @jwildeboer@social.wildeboer.net avatar

    deleted_by_author

  • Loading...
  • ERDonnachie,

    @jwildeboer
    Will have to take a look at that. It's crazy how many people/bots try to abuse any old server with IP address. I've been running fail2ban for quite a while, but maybe the crowdsourcing is worth having.

    keithzg,
    @keithzg@fediverse.keithzg.ca avatar

    @jwildeboer Always fun to watch such waves come in and spend themselves.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • DreamBathrooms
  • ngwrru68w68
  • modclub
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • mdbf
  • GTA5RPClips
  • JUstTest
  • tacticalgear
  • normalnudes
  • tester
  • osvaldo12
  • everett
  • cubers
  • ethstaker
  • anitta
  • provamag3
  • Leos
  • cisconetworking
  • megavids
  • lostlight
  • All magazines