09-27-2019
Quote:
fail2ban ... What do you think? Is that an important metric to add, do you think?
It maybe fail2ban is configured properly, up and running. That will definitely explain a rate below average. But f2b can be running without being configured to do blocking at all or not correctly adapted to the system. It may be a weak variable.
What regards the ssh port. From my experience it will make a huge difference if it's running on default port 22 or a custom port. Most attackers are just using the easiest methods because there's still enough to harvest.
Regarding my server list:
I did a quick check and removed the results which might not be plausible(flapm <= 0). There might be a pool of servers not shown because flapm rounded down to zero.
Last edited by stomp; 09-27-2019 at 02:10 PM..
This User Gave Thanks to stomp For This Post:
9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi,
I notice in my Sun Solaris 8 sparc workstation, if I failed my login in the 5th time, I will be closed the connection from the host.
I want to make 3 times. That is, if user fails to login with 3 attempts, he will be closed the connection.
How to do it? Of course I am the admin of the... (2 Replies)
Discussion started by: champion
2 Replies
2. Solaris
I am wondering if solaris captures id's associated w/invalid login attempts?
when I try to login as "test1" several (3-5) times, I do not find any userID info under "/var/adm" files:
utmpx
wtmpx
messages
lastlog
Is there another location/log I should be checking?
Is it necessary for... (6 Replies)
Discussion started by: mr_manny
6 Replies
3. AIX
Hi. I would like to be able to deny IP address for too many failed login attemps (either from ssh, sftp, ftp, etc). The system I wish this to work on is an AIX 5.1 system. I'm new to AIX but I'm a linux user. There is a program for linux called fail2ban which reads from the log files and see if... (1 Reply)
Discussion started by: metzgerh
1 Replies
4. AIX
Hi,
I have created the below ftp script to put files over to our capacity server, the check at the end works if ftp fails to run however if the script cannot login or the transfer itself failed there is no warnings.
Does anyone know the syntax to trap the erorr codes or to put a check within... (3 Replies)
Discussion started by: chlawren
3 Replies
5. Solaris
Hi,
I want to sent number of login attempts ,so that after that much attempts user account should be locked on solaris 10 (2 Replies)
Discussion started by: manoj.solaris
2 Replies
6. AIX
How can I see the number of invalid login attempts of a user?
Thanks, (9 Replies)
Discussion started by: agasamapetilon
9 Replies
7. Shell Programming and Scripting
Can you help me in providing the following output or a quite similar to this from a shell script ?
*** Logins Summary Information *****
----------------------------------
Failed Login Attempts for Invalid Accounts
Date Time IP-ADD Account ... (0 Replies)
Discussion started by: linuxgeek
0 Replies
8. UNIX for Dummies Questions & Answers
Dear experts,
I am seeing a lot of TCP failed connection attempts from "netstat -s" on one of our servers.
How can I pin point what connection failed and what are the ports involved?
Any tools/commands I can dig in deeper to diag. what went wrong on these "failed connection attempts"?
... (2 Replies)
Discussion started by: cache51
2 Replies
9. Solaris
Hey all I'm having a big problem here. Someone is attempting an SSH to a destination host on which an account resides and locking the account. I'm trying to determine who is performing the SSH attempts from my host. For instance they're logged in as their standard account but then (I'm assuming)... (13 Replies)
Discussion started by: MaindotC
13 Replies
LEARN ABOUT DEBIAN
eurephiadm-attempts
eurephiadm attempts(7) eurephiadm attempts(7)
NAME
eurephiadm-attempts - Manage the attempts log in eurephia
DESCRIPTION
When a remote user fails to authenticate correctly, the attemp will be logged. After a certain amount of attempts the IP address, certifi-
cate and/or user account will be blocked. The eurephiadm attempts command is used to get an overview over what is registered as failed
attempts and to give the possibility to reset or delete the registered attempts counter.
Available modes for the attempts command are:
-D | --delete
Delete a registered login attempt
-R | --reset
Reset a registered login attempt
-l | --list
List all registered login attempts
-h | --help <mode>
Show help
DELETE MODE
The attempts delete mode will remove a record from the attempts log.
One of the following parameters must be given (only one):
-u | --username <username>
User name to delete
-d | --digest <SHA1 digest>
Certificate SHA1 digest to delete
-i | --ipaddr <IP address>
IP address to delete
-a | --attemptid <ID>
Attempts record ID to delete
RESET MODE
The attempts reset mode will reset the attempt counter.
One of the following parameters must be given (only one):
-u | --username <username>
User name to reset
-d | --digest <SHA1 digest>
Certificate SHA1 digest to reset
-i | --ipaddr <IP address>
IP address to reset
-a | --attemptid <ID>
Attempts record ID to reset
LIST MODE
The attempts list mode will show all registered login attempts.
-v | --verbose
Show more details
Filters:
-u | --username <username>
List only attempts matching the given user name
-d | --digest <SHA1 digest>
List only attempts matching the given SHA1 certificate digest
-i | --ipaddr <IP address>
List only attempts matching the given IP address
SEE ALSO
eurephiadm-blacklist(7), eurephia-config(7)
AUTHOR
Copyright (C) 2008-2010 David Sommerseth <dazo@users.sourceforge.net>
David Sommerseth July 2010 eurephiadm attempts(7)