[asterisk-users] Brute force attacks

Jamie A. Stapleton jstapleton at computer-business.com
Thu Jul 1 16:56:06 CDT 2010


The IP 69.175.35.186 has just been banned by Fail2Ban after 293 attempts against our server.


From: asterisk-users-bounces at lists.digium.com [mailto:asterisk-users-bounces at lists.digium.com] On Behalf Of John Timms
Sent: Thursday, July 01, 2010 11:32 AM
To: Asterisk Users Mailing List - Non-Commercial Discussion
Subject: Re: [asterisk-users] Brute force attacks

On Thu, Jul 1, 2010 at 9:16 AM, Ishfaq Malik <ish at pack-net.co.uk<mailto:ish at pack-net.co.uk>> wrote:
Hi

We've just noticed attempts (close to 200000 attempts, sequential peer numbers) at guessing peers on 2 of out servers and thought I'd share the originating IPs with the list in case anyone wants to firewall them as we have done

109.170.106.59
112.142.55.18
124.157.161.67

Ish
--
Ishfaq Malik
Software Developer
PackNet Ltd

Office:   0161 660 3062

--
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
              http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
  http://lists.digium.com/mailman/listinfo/asterisk-users


We have noticed the same sort of activity on our server. The originating IP addresses attempting access were:

204.9.204.145 (hosted at U.S. Colo, I believe)
91.203.132.149 (Nephax)
130.70.157.186 (University of Louisiana)
61.160.121.46 (Chinanet)
109.170.0.10 (ReasonUP Ltd)

--
John Timms
IT Department - Gnoso Inc.
john at gnoso.com<mailto:john at gnoso.com>
--
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20100701/9dc9eaa1/attachment-0001.htm 


More information about the asterisk-users mailing list