[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[ale] 300,000 failed login attempts in 6 months!!!
- Subject: [ale] 300,000 failed login attempts in 6 months!!!
- From: mike at trausch.us (Michael B. Trausch)
- Date: Tue, 19 Aug 2008 17:44:53 -0400
- In-reply-to: <[email protected]>
- References: <003301c90200$e959c5c0$0301000a@S0030153310> <[email protected]>
On Tue, 2008-08-19 at 12:12 -0400, Jim Popovitch wrote:
> New? No. SSH brute force attempts are not new. You, as a target,
> might be new. ;-)
>
> Save yourself some trouble and run SSHD on a non-standard port.
I keep seeing this said over and over again, and I keep wondering: Are
the attackers _really_ that stupid? Wouldn't a simple portscan prior to
attempting to attack get rid of any benefit that this would provide?
--- Mike
--
My sigfile ran away and is on hiatus.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
Url : http://mail.ale.org/pipermail/ale/attachments/20080819/382a7b2b/attachment.bin