ubuntu – 服务器攻击,如何修复它

前端之家收集整理的这篇文章主要介绍了ubuntu – 服务器攻击,如何修复它前端之家小编觉得挺不错的,现在分享给大家,也给大家做个参考。
看起来服务器受到攻击. /var/log/auth.log的内容如下.它试图用所有这些用户名ssh,我怎么能把它关闭.服务器是Ubuntu.
  1. Feb 22 16:29:15 server sshd[23413]: Failed password for invalid user mirror from 220.132.192.220 port 43881 ssh2
  2. Feb 22 16:29:15 server sshd[23414]: Failed password for invalid user justice from 220.132.192.220 port 43882 ssh2
  3. Feb 22 16:29:15 server sshd[23416]: Failed password for invalid user london from 220.132.192.220 port 43885 ssh2
  4. Feb 22 16:29:15 server sshd[23415]: Failed password for invalid user justice from 220.132.192.220 port 43884 ssh2
  5. Feb 22 16:29:17 server sshd[23421]: Invalid user oxford from 203.66.115.43
  6. Feb 22 16:29:17 server sshd[23421]: pam_unix(sshd:auth): check pass; user unknown
  7. Feb 22 16:29:17 server sshd[23421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.66.115.43
  8. Feb 22 16:29:17 server sshd[23422]: Invalid user london from 203.66.115.43
  9. Feb 22 16:29:17 server sshd[23422]: pam_unix(sshd:auth): check pass; user unknown
  10. Feb 22 16:29:17 server sshd[23422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.66.115.43
  11. Feb 22 16:29:17 server sshd[23424]: Invalid user london from 203.66.115.43
  12. Feb 22 16:29:17 server sshd[23424]: pam_unix(sshd:auth): check pass; user unknown
  13. Feb 22 16:29:17 server sshd[23424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.66.115.43
  14. Feb 22 16:29:17 server sshd[23423]: Invalid user mirror from 203.66.115.43
  15. Feb 22 16:29:17 server sshd[23423]: pam_unix(sshd:auth): check pass; user unknown
  16. Feb 22 16:29:17 server sshd[23423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.66.115.43
  17. Feb 22 16:29:19 server sshd[23421]: Failed password for invalid user oxford from 203.66.115.43 port 43959 ssh2
  18. Feb 22 16:29:19 server sshd[23422]: Failed password for invalid user london from 203.66.115.43 port 43962 ssh2
  19. Feb 22 16:29:19 server sshd[23424]: Failed password for invalid user london from 203.66.115.43 port 43967 ssh2
  20. Feb 22 16:29:19 server sshd[23423]: Failed password for invalid user mirror from 203.66.115.43 port 43964 ssh2
  21. Feb 22 16:29:20 server sshd[23429]: Invalid user pacific from 220.132.192.220
  22. Feb 22 16:29:20 server sshd[23429]: pam_unix(sshd:auth): check pass; user unknown
  23. Feb 22 16:29:21 server sshd[23429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.192.220
  24. Feb 22 16:29:21 server sshd[23430]: Invalid user mirror from 220.132.192.220
  25. Feb 22 16:29:21 server sshd[23430]: pam_unix(sshd:auth): check pass; user unknown
  26. Feb 22 16:29:21 server sshd[23430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.192.220
  27. Feb 22 16:29:21 server sshd[23432]: Invalid user oxford from 220.132.192.220
  28. Feb 22 16:29:21 server sshd[23431]: Invalid user mirror from 220.132.192.220
  29. Feb 22 16:29:21 server sshd[23432]: pam_unix(sshd:auth): check pass; user unknown
  30. Feb 22 16:29:21 server sshd[23432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.192.220
  31. Feb 22 16:29:21 server sshd[23431]: pam_unix(sshd:auth): check pass; user unknown
  32. Feb 22 16:29:21 server sshd[23431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.192.220
  33. Feb 22 16:29:22 server sshd[23429]: Failed password for invalid user pacific from 220.132.192.220 port 44073 ssh2
  34. Feb 22 16:29:22 server sshd[23430]: Failed password for invalid user mirror from 220.132.192.220 port 44078 ssh2
  35. Feb 22 16:29:23 server sshd[23432]: Failed password for invalid user oxford from 220.132.192.220 port 44082 ssh2
  36. Feb 22 16:29:23 server sshd[23431]: Failed password for invalid user mirror from 220.132.192.220 port 44079 ssh2
  37. Feb 22 16:29:24 server sshd[23437]: Invalid user pizza from 202.39.75.16
  38. Feb 22 16:29:24 server sshd[23437]: pam_unix(sshd:auth): check pass; user unknown
  39. Feb 22 16:29:24 server sshd[23437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.75.16
  40. Feb 22 16:29:24 server sshd[23438]: Invalid user oxford from 202.39.75.16
  41. Feb 22 16:29:24 server sshd[23438]: pam_unix(sshd:auth): check pass; user unknown
  42. Feb 22 16:29:24 server sshd[23438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.75.16
  43. Feb 22 16:29:24 server sshd[23441]: Invalid user oxford from 202.39.75.16
  44. Feb 22 16:29:24 server sshd[23441]: pam_unix(sshd:auth): check pass; user unknown
  45. Feb 22 16:29:24 server sshd[23441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.75.16
  46. Feb 22 16:29:24 server sshd[23440]: Invalid user pacific from 202.39.75.16
  47. Feb 22 16:29:24 server sshd[23440]: pam_unix(sshd:auth): check pass; user unknown
  48. Feb 22 16:29:24 server sshd[23440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.75.16
  49. Feb 22 16:29:26 server sshd[23437]: Failed password for invalid user pizza from 202.39.75.16 port 44173 ssh2
  50. Feb 22 16:29:27 server sshd[23438]: Failed password for invalid user oxford from 202.39.75.16 port 44184 ssh2
  51. Feb 22 16:29:27 server sshd[23441]: Failed password for invalid user oxford from 202.39.75.16 port 44186 ssh2
  52. Feb 22 16:29:27 server sshd[23440]: Failed password for invalid user pacific from 202.39.75.16 port 44185 ssh2
  53. Feb 22 16:29:28 server sshd[23445]: Invalid user quality from 220.132.192.198
  54. Feb 22 16:29:28 server sshd[23445]: pam_unix(sshd:auth): check pass; user unknown
  55. Feb 22 16:29:28 server sshd[23445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.192.198
  56. Feb 22 16:29:29 server sshd[23446]: Invalid user pacific from 220.132.192.198
  57. Feb 22 16:29:29 server sshd[23446]: pam_unix(sshd:auth): check pass; user unknown
  58. Feb 22 16:29:29 server sshd[23446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.192.198
  59. Feb 22 16:29:29 server sshd[23448]: Invalid user pacific from 220.132.192.198
  60. Feb 22 16:29:29 server sshd[23448]: pam_unix(sshd:auth): check pass; user unknown
  61. Feb 22 16:29:29 server sshd[23448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.192.198
  62. Feb 22 16:29:29 server sshd[23450]: Invalid user pizza from 220.132.192.198
  63. Feb 22 16:29:29 server sshd[23450]: pam_unix(sshd:auth): check pass; user unknown
我相信有几次被抚养长大:

Securing SSH on Linux Ubuntu

Hundreds of failed ssh logins

BTW这些尝试非常常见,通常是自动脚本.

猜你在找的Ubuntu相关文章