Advertisement
voodooKobra

Script Kiddie Wall of Shame #1

May 29th, 2013
216
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.06 KB | None | 0 0
  1. Welcome to the Script Kiddie...
  2. __ __ _ _ __ _____ _
  3. \ \ / / | | | / _| / ____| |
  4. \ \ /\ / /_ _| | | ___ | |_ | (___ | |__ __ _ _ __ ___ ___
  5. \ \/ \/ / _` | | | / _ \| _| \___ \| '_ \ / _` | '_ ` _ \ / _ \
  6. \ /\ / (_| | | | | (_) | | ____) | | | | (_| | | | | | | __/
  7. \/ \/ \__,_|_|_| \___/|_| |_____/|_| |_|\__,_|_| |_| |_|\___|
  8.  
  9. The idea here is simple: When some lamers try to hack one of the
  10. systems I maintain without permission, and fail, I will showcase their
  11. stupidity here for everyone else's entertainment.
  12. _ ____ _____ ____
  13. / \ / _ \/ __// ___\
  14. | | | / \|| | _| \
  15. | |_/\| \_/|| |_//\___ |
  16. \____/\____/\____\\____/
  17.  
  18.  
  19. May 29 03:00:56 ssh sshd[22534]: Did not receive identification string from 184.173.67.140
  20. ~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~
  21. May 29 03:03:00 ssh sshd[22538]: Invalid user 1 from 184.173.67.140
  22. May 29 03:03:00 ssh sshd[22538]: pam_unix(sshd:auth): check pass; user unknown
  23. May 29 03:03:00 ssh sshd[22538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.173.67.140-static.reverse.softlayer.com
  24. May 29 03:03:02 ssh sshd[22538]: Failed password for invalid user 1 from 184.173.67.140 port 59686 ssh2
  25. ~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~
  26. May 29 03:03:03 ssh sshd[22540]: Invalid user a from 184.173.67.140
  27. May 29 03:03:03 ssh sshd[22540]: pam_unix(sshd:auth): check pass; user unknown
  28. May 29 03:03:03 ssh sshd[22540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.173.67.140-static.reverse.softlayer.com
  29. May 29 03:03:05 ssh sshd[22540]: Failed password for invalid user a from 184.173.67.140 port 60202 ssh2
  30. ~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~
  31. May 29 03:03:06 ssh sshd[22542]: Invalid user a from 184.173.67.140
  32. May 29 03:03:06 ssh sshd[22542]: pam_unix(sshd:auth): check pass; user unknown
  33. May 29 03:03:06 ssh sshd[22542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.173.67.140-static.reverse.softlayer.com
  34. May 29 03:03:08 ssh sshd[22542]: Failed password for invalid user a from 184.173.67.140 port 60594 ssh2
  35. ~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~
  36. May 29 03:03:09 ssh sshd[22544]: Invalid user aaron from 184.173.67.140
  37. May 29 03:03:09 ssh sshd[22544]: pam_unix(sshd:auth): check pass; user unknown
  38. May 29 03:03:09 ssh sshd[22544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.173.67.140-static.reverse.softlayer.com
  39. May 29 03:03:11 ssh sshd[22544]: Failed password for invalid user aaron from 184.173.67.140 port 32864 ssh2
  40. ~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~
  41. May 29 05:01:29 ssh sshd[22712]: Did not receive identification string from 124.160.227.5
  42. ~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~
  43. May 29 05:05:20 ssh sshd[22715]: Invalid user vyatta from 124.160.227.5
  44. May 29 05:05:20 ssh sshd[22715]: pam_unix(sshd:auth): check pass; user unknown
  45. May 29 05:05:20 ssh sshd[22715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.227.5
  46. May 29 05:05:21 ssh sshd[22715]: Failed password for invalid user vyatta from 124.160.227.5 port 47477 ssh2
  47. ~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~
  48. May 29 05:05:23 ssh sshd[22717]: Invalid user joggler from 124.160.227.5
  49. May 29 05:05:23 ssh sshd[22717]: pam_unix(sshd:auth): check pass; user unknown
  50. May 29 05:05:23 ssh sshd[22717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.227.5
  51. May 29 05:05:26 ssh sshd[22717]: Failed password for invalid user joggler from 124.160.227.5 port 47526 ssh2
  52. ~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~
  53. May 29 05:05:28 ssh sshd[22719]: Invalid user ubnt from 124.160.227.5
  54. May 29 05:05:28 ssh sshd[22719]: pam_unix(sshd:auth): check pass; user unknown
  55. May 29 05:05:28 ssh sshd[22719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.227.5
  56. May 29 05:05:30 ssh sshd[22719]: Failed password for invalid user ubnt from 124.160.227.5 port 47574 ssh2
  57. ~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~
  58. May 29 09:37:59 ssh sshd[23343]: reverse mapping checking getaddrinfo for ip196.hichina.com [121.196.129.155] failed - POSSIBLE BREAK-IN ATTEMPT!
  59. May 29 09:37:59 ssh sshd[23343]: Invalid user ts3 from 121.196.129.155
  60. May 29 09:37:59 ssh sshd[23343]: pam_unix(sshd:auth): check pass; user unknown
  61. May 29 09:37:59 ssh sshd[23343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.196.129.155
  62. May 29 09:38:01 ssh sshd[23343]: Failed password for invalid user ts3 from 121.196.129.155 port 33837 ssh2
  63. ~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~
  64. May 29 09:38:03 ssh sshd[23345]: reverse mapping checking getaddrinfo for ip196.hichina.com [121.196.129.155] failed - POSSIBLE BREAK-IN ATTEMPT!
  65. May 29 09:38:03 ssh sshd[23345]: Invalid user ts3 from 121.196.129.155
  66. May 29 09:38:03 ssh sshd[23345]: pam_unix(sshd:auth): check pass; user unknown
  67. May 29 09:38:03 ssh sshd[23345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.196.129.155
  68. May 29 09:38:06 ssh sshd[23345]: Failed password for invalid user ts3 from 121.196.129.155 port 34288 ssh2
  69. ~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~
  70. May 29 09:38:08 ssh sshd[23347]: reverse mapping checking getaddrinfo for ip196.hichina.com [121.196.129.155] failed - POSSIBLE BREAK-IN ATTEMPT!
  71. May 29 09:38:08 ssh sshd[23347]: Invalid user ts3 from 121.196.129.155
  72. May 29 09:38:08 ssh sshd[23347]: pam_unix(sshd:auth): check pass; user unknown
  73. May 29 09:38:08 ssh sshd[23347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.196.129.155
  74. May 29 09:38:10 ssh sshd[23347]: Failed password for invalid user ts3 from 121.196.129.155 port 34622 ssh2
  75. ~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~
  76. May 29 15:20:42 ssh sshd[24243]: reverse mapping checking getaddrinfo for ip196.hichina.com [121.196.129.155] failed - POSSIBLE BREAK-IN ATTEMPT!
  77. May 29 15:20:42 ssh sshd[24243]: Invalid user ts3server from 121.196.129.155
  78. May 29 15:20:42 ssh sshd[24243]: pam_unix(sshd:auth): check pass; user unknown
  79. May 29 15:20:42 ssh sshd[24243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.196.129.155
  80. May 29 15:20:44 ssh sshd[24243]: Failed password for invalid user ts3server from 121.196.129.155 port 44834 ssh2
  81. ~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~
  82. May 29 16:24:21 ssh sshd[24334]: reverse mapping checking getaddrinfo for ip196.hichina.com [121.196.129.155] failed - POSSIBLE BREAK-IN ATTEMPT!
  83. May 29 16:24:21 ssh sshd[24334]: Invalid user ts3server from 121.196.129.155
  84. May 29 16:24:21 ssh sshd[24334]: pam_unix(sshd:auth): check pass; user unknown
  85. May 29 16:24:21 ssh sshd[24334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.196.129.155
  86. May 29 16:24:23 ssh sshd[24334]: Failed password for invalid user ts3server from 121.196.129.155 port 48975 ssh2
  87. ~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~
  88. May 29 16:24:25 ssh sshd[24336]: reverse mapping checking getaddrinfo for ip196.hichina.com [121.196.129.155] failed - POSSIBLE BREAK-IN ATTEMPT!
  89. May 29 16:24:25 ssh sshd[24336]: Invalid user ts3server from 121.196.129.155
  90. May 29 16:24:25 ssh sshd[24336]: pam_unix(sshd:auth): check pass; user unknown
  91. May 29 16:24:25 ssh sshd[24336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.196.129.155
  92. May 29 16:24:27 ssh sshd[24336]: Failed password for invalid user ts3server from 121.196.129.155 port 49293 ssh2
  93. ~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~
  94. May 29 16:24:29 ssh sshd[24338]: reverse mapping checking getaddrinfo for ip196.hichina.com [121.196.129.155] failed - POSSIBLE BREAK-IN ATTEMPT!
  95. May 29 16:24:29 ssh sshd[24338]: Invalid user ts3server from 121.196.129.155
  96. May 29 16:24:29 ssh sshd[24338]: pam_unix(sshd:auth): check pass; user unknown
  97. May 29 16:24:29 ssh sshd[24338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.196.129.155
  98. May 29 16:24:32 ssh sshd[24338]: Failed password for invalid user ts3server from 121.196.129.155 port 49582 ssh2
  99. ~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~
  100. May 29 17:24:47 ssh sshd[24479]: reverse mapping checking getaddrinfo for ip196.hichina.com [121.196.129.155] failed - POSSIBLE BREAK-IN ATTEMPT!
  101. May 29 17:24:47 ssh sshd[24479]: Invalid user ts3server from 121.196.129.155
  102. May 29 17:24:47 ssh sshd[24479]: pam_unix(sshd:auth): check pass; user unknown
  103. May 29 17:24:47 ssh sshd[24479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.196.129.155
  104. May 29 17:24:49 ssh sshd[24479]: Failed password for invalid user ts3server from 121.196.129.155 port 37948 ssh2
  105. ~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~
  106. May 29 17:24:52 ssh sshd[24481]: reverse mapping checking getaddrinfo for ip196.hichina.com [121.196.129.155] failed - POSSIBLE BREAK-IN ATTEMPT!
  107. May 29 17:24:52 ssh sshd[24481]: Invalid user ts3server from 121.196.129.155
  108. May 29 17:24:52 ssh sshd[24481]: pam_unix(sshd:auth): check pass; user unknown
  109. May 29 17:24:52 ssh sshd[24481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.196.129.155
  110. May 29 17:24:54 ssh sshd[24481]: Failed password for invalid user ts3server from 121.196.129.155 port 38297 ssh2
  111. ~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~8<~
  112. oooooooooo o8 o88
  113. 888 888 oo oooooo ooooooo o888oo oooo ooooooooo
  114. 888oooo88 888 888 888 888 888 888 888 888
  115. 888 888 888 888 888 888 888 888
  116. o888o o888o 88ooo88 888o o888o 888ooo88
  117. o888
  118. Switching your proxies while running a scan just makes it easier to correlate
  119. your abusive behavior across multiple identities. It's called contamination.
  120.  
  121. Let's take a look at these IP addresses, shall we?
  122. 121.196.129.155 # China
  123. 1 website uses this address. (example: aleding.com)
  124. # Either a webmaster or someone shat where they eat
  125. 124.160.227.5 # China
  126. No websites use this address
  127. # Home IP? I wonder
  128. 184.173.67.140 # Hacked Server
  129. 332 websites use this address. (examples: 1copywriter.net 49panhead.com 4bella.com 4earth.com)
  130. # Proxy... I wonder who else has been targeted unsuccessfully by 184.173.67.140 today
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement