-
GAMEPOD.hu
TP-Link WDR3600 - N600 router
Új hozzászólás Aktív témák
-
donmackó
őstag
Üdv Urak!
Ez mit jelentene? Kezdhetek félni hogy valaki törni próbálja a routert?
Nov 7 09:17:55 OpenWrt daemon.info dnsmasq-dhcp[2397]: DHCPACK(br-lan) 192.168.1.174 e8:94:f6:d4:38:44 SamknowsWhitebox
Nov 7 09:56:48 OpenWrt kern.warn kernel: [151550.350000] BruteForce-SSH IN=eth0.2 OUT= MAC=64:66:b3:ce:1a:ce:44:32:c8:45:f6:70:08:00:45:00:00:30 SRC=222.186.34.164 DST=192.168.0.12 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=17456 DF PROTO=TCP SPT=1982 DPT=2222 WINDOW=65535 R
Nov 7 09:56:48 OpenWrt kern.warn kernel: [151550.370000] BruteForce-SSH IN=eth0.2 OUT= MAC=64:66:b3:ce:1a:ce:44:32:c8:45:f6:70:08:00:45:00:00:30 SRC=222.186.34.164 DST=192.168.0.12 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=17503 DF PROTO=TCP SPT=2013 DPT=2222 WINDOW=65535 R
Nov 7 09:56:49 OpenWrt authpriv.info dropbear[14482]: Child connection from 222.186.34.164:1963
Nov 7 09:56:49 OpenWrt authpriv.info dropbear[14481]: Child connection from 222.186.34.164:1926
Nov 7 09:56:51 OpenWrt kern.warn kernel: [151553.240000] BruteForce-SSH IN=eth0.2 OUT= MAC=64:66:b3:ce:1a:ce:44:32:c8:45:f6:70:08:00:45:00:00:30 SRC=222.186.34.164 DST=192.168.0.12 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=19292 DF PROTO=TCP SPT=2013 DPT=2222 WINDOW=65535 R
Nov 7 09:56:51 OpenWrt kern.warn kernel: [151553.260000] BruteForce-SSH IN=eth0.2 OUT= MAC=64:66:b3:ce:1a:ce:44:32:c8:45:f6:70:08:00:45:00:00:30 SRC=222.186.34.164 DST=192.168.0.12 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=19297 DF PROTO=TCP SPT=1982 DPT=2222 WINDOW=65535 R
Nov 7 09:56:56 OpenWrt authpriv.warn dropbear[14482]: Bad password attempt for 'root' from 222.186.34.164:1963
Nov 7 09:56:56 OpenWrt authpriv.warn dropbear[14481]: Bad password attempt for 'root' from 222.186.34.164:1926
Nov 7 09:56:57 OpenWrt authpriv.warn dropbear[14482]: Bad password attempt for 'root' from 222.186.34.164:1963
Nov 7 09:56:57 OpenWrt authpriv.warn dropbear[14481]: Bad password attempt for 'root' from 222.186.34.164:1926
Nov 7 09:56:58 OpenWrt authpriv.warn dropbear[14482]: Bad password attempt for 'root' from 222.186.34.164:1963
Nov 7 09:56:59 OpenWrt authpriv.warn dropbear[14481]: Bad password attempt for 'root' from 222.186.34.164:1926
Nov 7 09:57:00 OpenWrt authpriv.warn dropbear[14482]: Bad password attempt for 'root' from 222.186.34.164:1963
Nov 7 09:57:00 OpenWrt authpriv.warn dropbear[14481]: Bad password attempt for 'root' from 222.186.34.164:1926
Nov 7 09:57:01 OpenWrt authpriv.warn dropbear[14482]: Bad password attempt for 'root' from 222.186.34.164:1963
Nov 7 09:57:01 OpenWrt authpriv.warn dropbear[14481]: Bad password attempt for 'root' from 222.186.34.164:1926
Nov 7 09:57:02 OpenWrt authpriv.warn dropbear[14482]: Bad password attempt for 'root' from 222.186.34.164:1963
Nov 7 09:57:02 OpenWrt authpriv.warn dropbear[14481]: Bad password attempt for 'root' from 222.186.34.164:1926
Nov 7 09:57:03 OpenWrt authpriv.warn dropbear[14482]: Bad password attempt for 'root' from 222.186.34.164:1963
Nov 7 09:57:03 OpenWrt authpriv.warn dropbear[14481]: Bad password attempt for 'root' from 222.186.34.164:1926
Nov 7 09:57:04 OpenWrt authpriv.info dropbear[14482]: Exit before auth (user 'root', 7 fails): Error reading: Connection reset by peer
Nov 7 09:57:04 OpenWrt authpriv.info dropbear[14481]: Exit before auth (user 'root', 7 fails): Error reading: Connection reset by peerKernel napló:
[151550.350000] BruteForce-SSH IN=eth0.2 OUT= MAC=64:66:b3:ce:1a:ce:44:32:c8:45:f6:70:08:00:45:00:00:30 SRC=222.186.34.164 DST=192.168.0.12 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=17456 DF PROTO=TCP SPT=1982 DPT=2222 WINDOW=65535 RES=0x00 SYN URGP=0
[151550.370000] BruteForce-SSH IN=eth0.2 OUT= MAC=64:66:b3:ce:1a:ce:44:32:c8:45:f6:70:08:00:45:00:00:30 SRC=222.186.34.164 DST=192.168.0.12 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=17503 DF PROTO=TCP SPT=2013 DPT=2222 WINDOW=65535 RES=0x00 SYN URGP=0
[151553.240000] BruteForce-SSH IN=eth0.2 OUT= MAC=64:66:b3:ce:1a:ce:44:32:c8:45:f6:70:08:00:45:00:00:30 SRC=222.186.34.164 DST=192.168.0.12 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=19292 DF PROTO=TCP SPT=2013 DPT=2222 WINDOW=65535 RES=0x00 SYN URGP=0
[151553.260000] BruteForce-SSH IN=eth0.2 OUT= MAC=64:66:b3:ce:1a:ce:44:32:c8:45:f6:70:08:00:45:00:00:30 SRC=222.186.34.164 DST=192.168.0.12 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=19297 DF PROTO=TCP SPT=1982 DPT=2222 WINDOW=65535 RES=0x00 SYN URGP=0Bocs bele került pár érdektelen sor is a copy/paste-ba.
[ Szerkesztve ]
Release the cable hounds!
Új hozzászólás Aktív témák
Állásajánlatok
Cég: Ozeki Kft.
Város: Debrecen
Cég: Promenade Publishing House Kft.
Város: Budapest