搜索热词

看起来服务器受到攻击. /var/log/auth.log的内容如下.它试图用所有这些用户名ssh,我怎么能把它关闭.服务器是Ubuntu.

Feb 22 16:29:15 server sshd[23413]: Failed password for invalid user mirror from 220.132.192.220 port 43881 ssh2

Feb 22 16:29:15 server sshd[23414]: Failed password for invalid user justice from 220.132.192.220 port 43882 ssh2

Feb 22 16:29:15 server sshd[23416]: Failed password for invalid user london from 220.132.192.220 port 43885 ssh2

Feb 22 16:29:15 server sshd[23415]: Failed password for invalid user justice from 220.132.192.220 port 43884 ssh2

Feb 22 16:29:17 server sshd[23421]: Invalid user oxford from 203.66.115.43

Feb 22 16:29:17 server sshd[23421]: pam_unix(sshd:auth): check pass; user unknown

Feb 22 16:29:17 server sshd[23421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.66.115.43

Feb 22 16:29:17 server sshd[23422]: Invalid user london from 203.66.115.43

Feb 22 16:29:17 server sshd[23422]: pam_unix(sshd:auth): check pass; user unknown

Feb 22 16:29:17 server sshd[23422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.66.115.43

Feb 22 16:29:17 server sshd[23424]: Invalid user london from 203.66.115.43

Feb 22 16:29:17 server sshd[23424]: pam_unix(sshd:auth): check pass; user unknown

Feb 22 16:29:17 server sshd[23424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.66.115.43

Feb 22 16:29:17 server sshd[23423]: Invalid user mirror from 203.66.115.43

Feb 22 16:29:17 server sshd[23423]: pam_unix(sshd:auth): check pass; user unknown

Feb 22 16:29:17 server sshd[23423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.66.115.43

Feb 22 16:29:19 server sshd[23421]: Failed password for invalid user oxford from 203.66.115.43 port 43959 ssh2

Feb 22 16:29:19 server sshd[23422]: Failed password for invalid user london from 203.66.115.43 port 43962 ssh2

Feb 22 16:29:19 server sshd[23424]: Failed password for invalid user london from 203.66.115.43 port 43967 ssh2

Feb 22 16:29:19 server sshd[23423]: Failed password for invalid user mirror from 203.66.115.43 port 43964 ssh2

Feb 22 16:29:20 server sshd[23429]: Invalid user pacific from 220.132.192.220

Feb 22 16:29:20 server sshd[23429]: pam_unix(sshd:auth): check pass; user unknown

Feb 22 16:29:21 server sshd[23429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.192.220

Feb 22 16:29:21 server sshd[23430]: Invalid user mirror from 220.132.192.220

Feb 22 16:29:21 server sshd[23430]: pam_unix(sshd:auth): check pass; user unknown

Feb 22 16:29:21 server sshd[23430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.192.220

Feb 22 16:29:21 server sshd[23432]: Invalid user oxford from 220.132.192.220

Feb 22 16:29:21 server sshd[23431]: Invalid user mirror from 220.132.192.220

Feb 22 16:29:21 server sshd[23432]: pam_unix(sshd:auth): check pass; user unknown

Feb 22 16:29:21 server sshd[23432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.192.220

Feb 22 16:29:21 server sshd[23431]: pam_unix(sshd:auth): check pass; user unknown

Feb 22 16:29:21 server sshd[23431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.192.220

Feb 22 16:29:22 server sshd[23429]: Failed password for invalid user pacific from 220.132.192.220 port 44073 ssh2

Feb 22 16:29:22 server sshd[23430]: Failed password for invalid user mirror from 220.132.192.220 port 44078 ssh2

Feb 22 16:29:23 server sshd[23432]: Failed password for invalid user oxford from 220.132.192.220 port 44082 ssh2

Feb 22 16:29:23 server sshd[23431]: Failed password for invalid user mirror from 220.132.192.220 port 44079 ssh2

Feb 22 16:29:24 server sshd[23437]: Invalid user pizza from 202.39.75.16

Feb 22 16:29:24 server sshd[23437]: pam_unix(sshd:auth): check pass; user unknown

Feb 22 16:29:24 server sshd[23437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.75.16

Feb 22 16:29:24 server sshd[23438]: Invalid user oxford from 202.39.75.16

Feb 22 16:29:24 server sshd[23438]: pam_unix(sshd:auth): check pass; user unknown

Feb 22 16:29:24 server sshd[23438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.75.16

Feb 22 16:29:24 server sshd[23441]: Invalid user oxford from 202.39.75.16

Feb 22 16:29:24 server sshd[23441]: pam_unix(sshd:auth): check pass; user unknown

Feb 22 16:29:24 server sshd[23441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.75.16

Feb 22 16:29:24 server sshd[23440]: Invalid user pacific from 202.39.75.16

Feb 22 16:29:24 server sshd[23440]: pam_unix(sshd:auth): check pass; user unknown

Feb 22 16:29:24 server sshd[23440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.75.16

Feb 22 16:29:26 server sshd[23437]: Failed password for invalid user pizza from 202.39.75.16 port 44173 ssh2

Feb 22 16:29:27 server sshd[23438]: Failed password for invalid user oxford from 202.39.75.16 port 44184 ssh2

Feb 22 16:29:27 server sshd[23441]: Failed password for invalid user oxford from 202.39.75.16 port 44186 ssh2

Feb 22 16:29:27 server sshd[23440]: Failed password for invalid user pacific from 202.39.75.16 port 44185 ssh2

Feb 22 16:29:28 server sshd[23445]: Invalid user quality from 220.132.192.198

Feb 22 16:29:28 server sshd[23445]: pam_unix(sshd:auth): check pass; user unknown

Feb 22 16:29:28 server sshd[23445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.192.198

Feb 22 16:29:29 server sshd[23446]: Invalid user pacific from 220.132.192.198

Feb 22 16:29:29 server sshd[23446]: pam_unix(sshd:auth): check pass; user unknown

Feb 22 16:29:29 server sshd[23446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.192.198

Feb 22 16:29:29 server sshd[23448]: Invalid user pacific from 220.132.192.198

Feb 22 16:29:29 server sshd[23448]: pam_unix(sshd:auth): check pass; user unknown

Feb 22 16:29:29 server sshd[23448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.192.198

Feb 22 16:29:29 server sshd[23450]: Invalid user pizza from 220.132.192.198

Feb 22 16:29:29 server sshd[23450]: pam_unix(sshd:auth): check pass; user unknown

总结

如果觉得编程之家网站内容还不错,欢迎将编程之家网站推荐给程序员好友。

本图文内容来源于网友网络收集整理提供,作为学习参考使用,版权属于原作者。

如您喜欢寻找一群志同道合、互帮互助的学习伙伴,可以点击下方链接加入:

编程之家官方1群

编程之家官方2群

编程之家官方3群

编程之家官方4群

Ubuntu服务器修复,ubuntu – 服务器攻击,如何修复它相关推荐

  1. 游戏服务器修复,服务器内怪物不攻击问题修复方法

    本方法由steam社区收集结合酷牛后台情况修改. 1,关闭你的服务器. 2,点击后台面板中的一键备份存档. 3,打开后台面板中的文件管理器 4,打开根目录下的备份文件夹bakdirs 5,找到刚才备份 ...

  2. 服务器支持 TLS Client-initiated 重协商攻击(CVE-2011-1473) 修复记录

    服务器支持 TLS Client-initiated 重协商攻击(CVE-2011-1473) 修复记录 根据漏洞扫描反馈的结果,发现存在"服务器支持 TLS Client-initiate ...

  3. 服务器机械硬盘坏了怎么修复,机械硬盘能修吗

    多磁头技术:通过在同一碟片上增加多个磁头同时的读或写来为硬盘提速,或同时在多碟片同时利用磁头来读或写来为磁盘提速,多用于服务器和数据库中心.下面是学习啦小编带来的关于机械硬盘能修吗的内容,欢迎阅读! ...

  4. 百度卫士的修复服务器,云安服务器安全卫士功能介绍

    系统安全包括用户安全.账号守护.磁盘权限.网络安全.系统组件.系统服务.垃圾清理.优化设置.日志安全九个部分.系统安全可以给服务器系统提供安全保障. 云安服务器安全卫士下载地址: https://ww ...

  5. 服务器拒绝访问如何定位及修复

    服务器拒绝访问如何定位及修复 第一.问题定位 1.使用top查看当前系统资源占用情况,包括cpu.内存.硬盘 2.查看系统连接数据 netstat - an | awk '/^tcp/ {++S[ $ ...

  6. 中科方德服务器操作系统找到外置光盘,方德高可信服务器操作系统Meltdown和Spectre漏洞修复-中科方德.PDF...

    方德高可信服务器操作系统Meltdown和Spectre漏洞修复-中科方德 方德高可信服务器操作系统Meltdown和 Spectre 漏洞修复指南 导读:近日爆出的Intel CPU特性漏洞分为&q ...

  7. 零代价修复海量服务器的内核缺陷——UCloud内核热补丁技术揭秘

    下述为UCloud资深工程师邱模炯在InfoQ架构师峰会上的演讲--<UCloud云平台的内核实践>中非常受关注的内核热补丁技术的一部分.给大家揭开了UCloud云平台内核技术的神秘面纱. ...

  8. ubuntu下安装ftp服务器

    ubuntu下安装ftp服务器 Ftp服务器是使用以vsftp为例. 1. 安装     $sudo aptitude install vsftpd     $ps aux | grep 'ftp' ...

  9. 无网络服务器(linux ubuntu),pip安装python科学计算所有需要包(packages)

    无网络服务器(linux ubuntu),pip安装python科学计算所有需要包(packages) # 在windows上打开anaconda,进入环境tab页,在base环境处单击,然后点开te ...

最新文章

  1. python二十一:文件操作
  2. 听说你还没学Spring就被源码编译劝退了?30+张图带你玩转Spring编译
  3. Py之PyTables:PyTables的简介、安装、使用方法详细攻略
  4. springboot+mybatis多数据源最简解决方案
  5. php5.1 0day,DEDECMS 5.1 feedback_js.php 0DAY
  6. C++实现complex number复数的算法(附完整源码)
  7. SQLite 简介(http://www.w3cschool.cc/sqlite/sqlite-intro.html)
  8. Hammer.js移动端触屏框架的使用
  9. springboot health检查
  10. 死于非命的中国亿万富翁们 1
  11. Jenkins 自动化部署上线
  12. python的整除运算_Python3基础 ** 幂运算 // 整除运算
  13. Apple Pay发展与安全
  14. Python学习计划
  15. 玩转b站:实用的b站工具合集
  16. SICP 第一章的练习
  17. 一代JS代码可以搞定机器自动刷票,投票页数据验证很重要
  18. 解决Ubuntu18中 A stop job is running for .. 导致关机慢
  19. html5 调用系统相册,iOS之H5调用系统相册相机浏览文件
  20. ECC椭圆曲线详解(有具体实例)

热门文章

  1. Java设计模式学习总结(7)——结构型模式之适配器模式
  2. MyBatis学习总结(8)——Mybatis3.x与Spring4.x整合
  3. sqlitestudio和mysql_SQLiteStudio优雅调试Android手机数据库Sqlite(推荐)
  4. Idea启动报错 Error:java: System Java Compiler was not found in classpath
  5. Java API下载和查阅方法
  6. 史上最全设计模式——原型模式
  7. Cocos2d-Lua 输出脚本预编译错误产生位置
  8. CommonsChunkPlugin相关
  9. [翻译]AKKA笔记 - DEATHWATCH -7
  10. 关于QQ非会员发图限制