Hello,
I've been hammered on the ssh.
I'm receving many attempts like this one form different ips every day.
Is there anything I can do to block people who are trying to guess:
-wrong(non-existing) username more than 3 times in an hour
-password for any user more than 3 times in an hour
Changing the ssh port number is not an option.
Thanks in advance.
Regards Dan
I've been hammered on the ssh.
Code:
Sep 10 15:14:28 sshd[7287]: Did not receive identification string from 208.65.60.51
Sep 10 15:24:09 sshd[7474]: Invalid user staff from 208.65.60.51
Sep 10 15:25:00 sshd[7474]: reverse mapping checking getaddrinfo for geek.nerfimages.net failed - POSSIBLE BREAK-IN ATTEMPT!
Sep 10 13:25:00 sshd[7475]: input_userauth_request: invalid user staff
Sep 10 15:25:00 sshd[7474]: pam_unix(sshd:auth): check pass; user unknown
Sep 10 15:25:00 sshd[7474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.65.60.51
Sep 10 15:25:00 sshd[7474]: pam_succeed_if(sshd:auth): error retrieving information about user staff
Sep 10 13:25:01 sshd[7475]: Failed password for invalid user staff from 208.65.60.51 port 41717 ssh2
Sep 10 13:25:01 sshd[7475]: Connection closed by 208.65.60.51
Sep 10 15:25:01 sshd[7474]: Failed password for invalid user staff from 208.65.60.51 port 41717 ssh2
I'm receving many attempts like this one form different ips every day.
Is there anything I can do to block people who are trying to guess:
-wrong(non-existing) username more than 3 times in an hour
-password for any user more than 3 times in an hour
Changing the ssh port number is not an option.
Thanks in advance.
Regards Dan