"Eternally Experimental"
Personal test server consisting mostly of old junk.

Wall of shame: latest 10 SSH password attacks.

Remove boring stuff.

For about 20 years now, the logs of this little server have been flooded by brute force SSH password attacks. I don't always have an SSH key on me, so I refuse to disable password authentication just for some script kiddies. Instead, I installed a countermeasure named fail2ban. It temporarily bans an IP after 5 consecutive login failures. This needs to be a very low number, with the ban time as long as you can afford, to fend off attacks coming from many different IPs (botnets).It works so well, I decided to write a few scripts to show the results here for all to see. Note that the listed IP's most likely do not belong to the actual (human) attackers! Most of these IPs appear to be of machines that have been compromised themselves.

Machines that do get compromised in this way, probably have users named info, service, mysql, student, root, test etc... or ahmed, alan, albert, alberto, alex, alfred, ali, alice, allan, andi, andrew... (you get the idea) with guessable passwords. Anyone out of ideas to name their child, drop me a line and I'll send you some logs from before I installed fail2ban... :-)

UPDATE: Over the past decade, things have become a bit more grim and grown beyond the scr1pt k1dd13 realm, as these types of attacks are now commonly used to install Trojans for use in botnets. Besides obvious uses like sending spam or 'hacking' even more machines like yours, these botnets can be a powerful tool in destructive DoS attacks and such. Your machine may be actively participating in computer terrorism without you even knowing!

Please always use a non-guessable password that is long enough to not allow brute force either. You know the drill by now. Due to databases occasionally leaking, change them every now and then. Preferrably use a password manager so that you can set a different secure password for every site you create an account on, without having to memorize them all. I am personally a fan of Vivaldi's password (and notes) syncer across all my devices.

Less ... Show ... More
On 2024-03-08 08:58:37 <no dns> from Japan received a ban.
On 2024-03-08 08:56:49 <no dns> from Brazil received a ban.
On 2024-03-08 08:56:38 <no dns> from Brazil received a ban.
On 2024-03-08 08:27:21 <no dns> from Japan received a ban.
On 2024-03-08 08:11:11 <no dns> from China received a ban.
On 2024-03-08 08:09:01 <no dns> from China received a ban.
On 2024-03-08 08:05:33 <no dns> from Hong Kong received a ban.
On 2024-03-08 08:05:25 <no dns> from Brazil received a ban.
On 2024-03-08 08:05:18 <no dns> from China received a ban.
On 2024-03-08 08:04:41 <no dns> from China received a ban.

Wall of shame: Top attack bots this month: <no dns> from Japan  Received 140 bans. <no dns> from Brazil  Received 59 bans. <no dns> from Brazil  Received 42 bans. dedi.legaccord.org from Japan  Received 29 bans. <no dns> from China  Received 23 bans. server.venerablelaw.com from China  Received 22 bans. <no dns> from Hong Kong  Received 20 bans. <no dns> from Brazil  Received 19 bans. from China  Received 17 bans. vmi1137934.contaboserver.net from China  Received 16 bans.