Joe Pfeiffer <pfeif...@cs.nmsu.edu> writes:

> This isn't really debian-specific, but I don't know a better place to
> ask...  recently, I've been having servers make a large number of
> attempts to access my mail host using what appear to be random strings
> as usernames -- it looks like this:
>
> Apr  4 03:04:30 snowball saslauthd[1179]: pam_unix(:auth): check pass; user 
> unknown
> Apr  4 03:04:30 snowball saslauthd[1179]: pam_unix(:auth): authentication 
> failure; logname= uid=0 euid=0 tty= ruser= rhost=
> Apr  4 03:04:33 snowball saslauthd[1179]:                 : auth failure: 
> [user=1b391vovbh....@pfeifferfamily.net] [service=] [realm=] [mech=pam] 
> [reason=PAM auth error]
>
> They all have the same form: <something random>.f...@pfeifferfamily.net
>
> I'm trying to understand the point; it's not like there's any chance any
> of those usernames will be valid.  This isn't they usual attempts using
> usernames like root, admin, test1, scan...  those I understand.
>
> So, anybody have any ideas what's up here?

Hellow Joe,

#+BEGIN_SRC python
# -*- coding: utf-8 -*-

import re

p = re.compile("\
[1-9]?[0-9]?[0-9]\.[0-9]?[0-9]?[0-9]\.[0-9]?[0-9]?[0-9]\.[0-9]?[0-9]?[0-9]")

FPATH = "/var/log/auth.log" # you can edit here

f = open(FPATH, "r")
data = f.read()

f.close()

result = p.findall(data) # <class 'list'>

if __name__ == "__main__":
    print(result)
    print(len(result))
#+END_SRC

It is simple python3 script, first you could gather all ipv4 from
/var/log/auth.log, and then you can control traffic by other software
such as fail2ban, i think.


NOTES: all risk is your responsiblity ;;;

Sincerely, Linux fan Byung-Hee

-- 
^고맙습니다 _白衣從軍_ 감사합니다_^))//

Reply via email to