ssh scans from 64.5.53.57/li-57.members.linode.com
Today my server got scanned using a sshd brute-forcer by 64.5.53.57/li-57.members.linode.com - here are some of the logs :
Jan 31 19:20:09 hostname sshd[4600]: Failed password for invalid user alias from 64.5.53.57 port 1481 ssh2
Jan 31 19:20:09 hostname sshd[4600]: Received disconnect from 64.5.53.57: 11: Bye Bye
Jan 31 19:20:13 hostname sshd[15730]: Invalid user office from 64.5.53.57
Jan 31 19:20:13 hostname sshd[18045]: inputuserauthrequest: invalid user office
Jan 31 19:20:13 hostname sshd[18045]: Failed password for invalid user office from 64.5.53.57 port 1516 ssh2
Jan 31 19:20:13 hostname sshd[18045]: Received disconnect from 64.5.53.57: 11: Bye Bye
Jan 31 19:20:14 hostname sshd[10411]: Invalid user samba from 64.5.53.57
Jan 31 19:20:14 hostname sshd[10291]: inputuserauthrequest: invalid user samba
Jan 31 19:20:14 hostname sshd[10291]: Failed password for invalid user samba from 64.5.53.57 port 1602 ssh2
Jan 31 19:20:14 hostname sshd[10291]: Received disconnect from 64.5.53.57: 11: Bye Bye
Jan 31 19:20:15 hostname sshd[19375]: Invalid user tomcat from 64.5.53.57
Jan 31 19:20:15 hostname sshd[19370]: inputuserauthrequest: invalid user tomcat
Jan 31 19:20:15 hostname sshd[19370]: Failed password for invalid user tomcat from 64.5.53.57 port 1635 ssh2
Jan 31 19:20:15 hostname sshd[19370]: Received disconnect from 64.5.53.57: 11: Bye Bye
Jan 31 19:20:19 hostname sshd[15543]: Invalid user webadmin from 64.5.53.57
Jan 31 19:20:19 hostname sshd[23343]: inputuserauthrequest: invalid user webadmin
Jan 31 19:20:19 hostname sshd[23343]: Failed password for invalid user webadmin from 64.5.53.57 port 1676 ssh2
Jan 31 19:20:19 hostname sshd[23343]: Received disconnect from 64.5.53.57: 11: Bye Bye
Jan 31 19:20:19 hostname sshd[1033]: Invalid user spam from 64.5.53.57
Jan 31 19:20:19 hostname sshd[1024]: inputuserauthrequest: invalid user spam
Jan 31 19:20:19 hostname sshd[1024]: Failed password for invalid user spam from 64.5.53.57 port 1846 ssh2
Jan 31 19:20:19 hostname sshd[1024]: Received disconnect from 64.5.53.57: 11: Bye Bye
Jan 31 19:20:20 hostname sshd[23557]: Invalid user virus from 64.5.53.57
Jan 31 19:20:20 hostname sshd[23731]: inputuserauthrequest: invalid user virus
Jan 31 19:20:20 hostname sshd[23731]: Failed password for invalid user virus from 64.5.53.57 port 1867 ssh2
Jan 31 19:20:20 hostname sshd[23731]: Received disconnect from 64.5.53.57: 11: Bye Bye
Jan 31 19:20:21 hostname sshd[14019]: Invalid user cyrus from 64.5.53.57
Jan 31 19:20:21 hostname sshd[1486]: inputuserauthrequest: invalid user cyrus
Jan 31 19:20:21 hostname sshd[1486]: Failed password for invalid user cyrus from 64.5.53.57 port 1913 ssh2
Jan 31 19:20:21 hostname sshd[1486]: Received disconnect from 64.5.53.57: 11: Bye Bye
My OpenBSD firewall detected this (by noticing it was using too many connections in too short a time span) and used PF (PacketFilter, an OBSD firewalling tool) to automatically drop all subsequent packets from this host. I also use skey authentication only, so it wasn't going to affect me. This leads me to suspect the attack was random - anyone that knew my system's security wouldn't bother with such a pointless scan.
The scan was also done by a ssh scanning tool, as detailed here :
So, it looks likely that this host is scanning portions of the internet for vulnurable ssh servers. This means that the server has either been hacked or has a bad user on it who is attempting to build himself a list of valid logins to other hosts on the internet by simply brute forcing the sshds he finds in scans.
Normally I don't bother to report such scans to the ISP of the server that does them, because many ISPs won't bother to do anything about hacked or abused servers. I used to have a linode myself though, so I'm aware of the excellent customer service here and don't want to see linodes used for evil things.
So, if Caker or another member of staff could check that the server hasn't been compromised (and take action if it has), then it would be appreciated.
I'm sure we could all do with less places on the internet randomly scanning servers with sshd brute forcing tools