Successful SSH Attack - Need help cleaning up

Corey Edwards tensai at
Mon Oct 30 15:31:17 MST 2006

On Mon, 2006-10-30 at 12:21 -0700, Daniel wrote:
> I will try to use a different port
> and implement the iptables approach to deterring attacks.

In addition to the rate limiting methods, you might try something like
Deny Hosts[1] or SSH Lockout[2]. I'm biased to the latter as I'm the
author. :)



-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 191 bytes
Desc: This is a digitally signed message part
Url : 

More information about the PLUG mailing list