The IP 69.175.35.186 has just been banned by Fail2Ban after 293 attempts against our server.
From: asterisk-users-boun...@lists.digium.com [mailto:asterisk-users-boun...@lists.digium.com] On Behalf Of John Timms Sent: Thursday, July 01, 2010 11:32 AM To: Asterisk Users Mailing List - Non-Commercial Discussion Subject: Re: [asterisk-users] Brute force attacks On Thu, Jul 1, 2010 at 9:16 AM, Ishfaq Malik <i...@pack-net.co.uk<mailto:i...@pack-net.co.uk>> wrote: Hi We've just noticed attempts (close to 200000 attempts, sequential peer numbers) at guessing peers on 2 of out servers and thought I'd share the originating IPs with the list in case anyone wants to firewall them as we have done 109.170.106.59 112.142.55.18 124.157.161.67 Ish -- Ishfaq Malik Software Developer PackNet Ltd Office: 0161 660 3062 -- _____________________________________________________________________ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- New to Asterisk? Join us for a live introductory webinar every Thurs: http://www.asterisk.org/hello asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users We have noticed the same sort of activity on our server. The originating IP addresses attempting access were: 204.9.204.145 (hosted at U.S. Colo, I believe) 91.203.132.149 (Nephax) 130.70.157.186 (University of Louisiana) 61.160.121.46 (Chinanet) 109.170.0.10 (ReasonUP Ltd) -- John Timms IT Department - Gnoso Inc. j...@gnoso.com<mailto:j...@gnoso.com> --
-- _____________________________________________________________________ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- New to Asterisk? Join us for a live introductory webinar every Thurs: http://www.asterisk.org/hello asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users