Advertisement
Guest User

Untitled

a guest
Oct 14th, 2018
91
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 12.74 KB | None | 0 0
  1. Dzień dobry
  2.  
  3. Otrzymaliśmy wiele zgłoszeń typu abuse dotyczących adresu IP używanego przez Państwa VPS.
  4. Prosimy o pilną stosowną reakcję w tej sprawie np. poprzez przeskanowanie VPS pod kątem złośliwego oprogramowania (malware) lub reinstalacji systemu po zgraniu ważnych danych i zabezpieczenie go od samego początku gdy system jest jeszcze świeży aby uniknąć na przyszłość takich zdarzeń.
  5. W przypadku braku pilnej reakcji i otrzymania kolejnych zgłoszeń abuse usługa może zostać zawieszona lub usunięta.
  6.  
  7. Więcej informacji o popularnym problemie z malware oraz rozwiązaniami można znaleźć w tym wątku na naszym forum:
  8. https://forum.lvlup.pro/t/jak-zabezpieczyc-vpsa-przed-wlamaniami-botow-na-ssh/96
  9.  
  10. W razie pytań lub wątpliwości służymy też pomocą w systemie zgłoszeń:
  11. https://lvlup.pro/panel/support
  12.  
  13. Pozdrawiam
  14. Michał Frąckiewicz
  15.  
  16. Poniżej znajdują się kopie otrzymanych zgłoszeń abuse:
  17.  
  18. ---------- Forwarded message ---------
  19. From: jlanhosting.com Abuse <alert@jlanhosting.com>
  20. Date: wt., 9 paź 2018 o 23:32
  21. Subject: Abuse from 164.132.112.8---
  22. To: <abuse@lvlup.pro>, <abuse@ovh.net>
  23.  
  24.  
  25. Dear Sir/Madam,
  26.  
  27. We have detected abuse from the IP address 164.132.112.8, which according to a whois lookup is on your network. We would appreciate if you would investigate and take action as appropriate.
  28.  
  29. Last 20 log lines are given below, but please ask if you require any further information.
  30.  
  31. (If you are not the correct person to contact about this please accept our apologies - your e-mail address was extracted from the whois record by an automated process. This mail was generated by Fail2Ban.)
  32.  
  33. Addresses to send to
  34. abuse@lvlup.pro,abuse@ovh.net
  35.  
  36. Note: Local timezone is +0300 (EEST)
  37. Oct 10 00:29:18 monitoring sshd[2517]: Did not receive identification string from 164.132.112.8
  38. Oct 10 00:31:08 monitoring sshd[4298]: Invalid user a from 164.132.112.8
  39. Oct 10 00:31:08 monitoring sshd[4298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8
  40. Oct 10 00:31:10 monitoring sshd[4298]: Failed password for invalid user a from 164.132.112.8 port 57744 ssh2
  41. Oct 10 00:31:10 monitoring sshd[4298]: Received disconnect from 164.132.112.8: 11: Normal Shutdown, Thank you for playing [preauth]
  42. Oct 10 00:32:00 monitoring sshd[5112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8 user=root
  43. Oct 10 00:32:02 monitoring sshd[5112]: Failed password for root from 164.132.112.8 port 45668 ssh2
  44. Oct 10 00:32:02 monitoring sshd[5112]: Received disconnect from 164.132.112.8: 11: Normal Shutdown, Thank you for playing [preauth]
  45. Oct 10 00:33:06 monitoring sshd[6184]: Invalid user oracle from 164.132.112.8
  46. Oct 10 00:33:06 monitoring sshd[6184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8
  47. Oct 10 00:33:08 monitoring sshd[6184]: Failed password for invalid user oracle from 164.132.112.8 port 36252 ssh2
  48. Oct 10 00:33:08 monitoring sshd[6184]: Received disconnect from 164.132.112.8: 11: Normal Shutdown, Thank you for playing [preauth]
  49. Oct 10 00:34:13 monitoring sshd[7255]: Invalid user nagios from 164.132.112.8
  50. Oct 10 00:34:13 monitoring sshd[7255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8
  51.  
  52.  
  53.  
  54.  
  55.  
  56.  
  57. ---------- Forwarded message ---------
  58. From: root <root@vweb02.mine-host.de>
  59. Date: wt., 9 paź 2018 o 22:52
  60. Subject: Abuse from 164.132.112.8
  61. To: <abuse@lvlup.pro>, <abuse@ovh.net>
  62.  
  63.  
  64. Dear Sir/Madam,
  65.  
  66. We have detected abuse from the IP address 164.132.112.8, which according to a whois lookup is on your network. We would appreciate if you would investigate and take action as appropriate.
  67.  
  68. Log lines are given below, but please ask if you require any further information.
  69.  
  70. (If you are not the correct person to contact about this please accept our apologies - your e-mail address was extracted from the whois record by an automated process. This mail was generated by Fail2Ban.)
  71.  
  72. Note: Local timezone is +0200 (CEST)
  73. Oct 9 19:45:55 vweb02 sshd[28212]: Did not receive identification string from 164.132.112.8 port 41808
  74. Oct 9 19:48:58 vweb02 sshd[28533]: Invalid user a from 164.132.112.8 port 35272
  75. Oct 9 19:48:58 vweb02 sshd[28533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8
  76. Oct 9 19:49:00 vweb02 sshd[28533]: Failed password for invalid user a from 164.132.112.8 port 35272 ssh2
  77. Oct 9 19:49:00 vweb02 sshd[28533]: Received disconnect from 164.132.112.8 port 35272:11: Normal Shutdown, Thank you for playing [preauth]
  78. Oct 9 19:49:00 vweb02 sshd[28533]: Disconnected from 164.132.112.8 port 35272 [preauth]
  79. Oct 9 19:49:12 vweb02 sshd[28612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8 user=root
  80. Oct 9 19:49:14 vweb02 sshd[28612]: Failed password for root from 164.132.112.8 port 47662 ssh2
  81. Oct 9 19:49:14 vweb02 sshd[28612]: Received disconnect from 164.132.112.8 port 47662:11: Normal Shutdown, Thank you for playing [preauth]
  82. Oct 9 19:49:14 vweb02 sshd[28612]: Disconnected from 164.132.112.8 port 47662 [preauth]
  83. Oct 9 19:49:30 vweb02 sshd[28635]: Invalid user oracle from 164.132.112.8 port 32962
  84. Oct 9 19:49:30 vweb02 sshd[28635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8
  85. Oct 9 19:49:32 vweb02 sshd[28635]: Failed password for invalid user oracle from 164.132.112.8 port 32962 ssh2
  86. Oct 9 20:49:46 vweb02 sshd[13835]: Invalid user appuser from 164.132.112.8 port 60090
  87. Oct 9 20:49:46 vweb02 sshd[13835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8
  88. Oct 9 20:49:47 vweb02 sshd[13835]: Failed password for invalid user appuser from 164.132.112.8 port 60090 ssh2
  89. Oct 9 20:49:47 vweb02 sshd[13835]: Received disconnect from 164.132.112.8 port 60090:11: Normal Shutdown, Thank you for playing [preauth]
  90. Oct 9 20:49:47 vweb02 sshd[13835]: Disconnected from 164.132.112.8 port 60090 [preauth]
  91. Oct 9 20:50:07 vweb02 sshd[14790]: Invalid user cxwh from 164.132.112.8 port 45054
  92. Oct 9 20:50:07 vweb02 sshd[14790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8
  93. Oct 9 20:50:08 vweb02 sshd[14790]: Failed password for invalid user cxwh from 164.132.112.8 port 45054 ssh2
  94. Oct 9 20:50:08 vweb02 sshd[14790]: Received disconnect from 164.132.112.8 port 45054:11: Normal Shutdown, Thank you for playing [preauth]
  95. Oct 9 20:50:08 vweb02 sshd[14790]: Disconnected from 164.132.112.8 port 45054 [preauth]
  96. Oct 9 20:50:28 vweb02 sshd[15010]: Invalid user cxwh from 164.132.112.8 port 58474
  97. Oct 9 20:50:28 vweb02 sshd[15010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8
  98. Oct 9 20:50:30 vweb02 sshd[15010]: Failed password for invalid user cxwh from 164.132.112.8 port 58474 ssh2
  99. Oct 9 21:50:39 vweb02 sshd[31475]: Invalid user sybase from 164.132.112.8 port 36908
  100. Oct 9 21:50:39 vweb02 sshd[31475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8
  101. Oct 9 21:50:41 vweb02 sshd[31475]: Failed password for invalid user sybase from 164.132.112.8 port 36908 ssh2
  102. Oct 9 21:50:41 vweb02 sshd[31475]: Received disconnect from 164.132.112.8 port 36908:11: Normal Shutdown, Thank you for playing [preauth]
  103. Oct 9 21:50:41 vweb02 sshd[31475]: Disconnected from 164.132.112.8 port 36908 [preauth]
  104. Oct 9 21:51:01 vweb02 sshd[31510]: Invalid user deploy from 164.132.112.8 port 50832
  105. Oct 9 21:51:01 vweb02 sshd[31510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8
  106. Oct 9 21:51:03 vweb02 sshd[31510]: Failed password for invalid user deploy from 164.132.112.8 port 50832 ssh2
  107. Oct 9 21:51:03 vweb02 sshd[31510]: Received disconnect from 164.132.112.8 port 50832:11: Normal Shutdown, Thank you for playing [preauth]
  108. Oct 9 21:51:03 vweb02 sshd[31510]: Disconnected from 164.132.112.8 port 50832 [preauth]
  109. Oct 9 21:51:23 vweb02 sshd[31591]: Invalid user wiki from 164.132.112.8 port 35082
  110. Oct 9 21:51:23 vweb02 sshd[31591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8
  111. Oct 9 21:51:24 vweb02 sshd[31591]: Failed password for invalid user wiki from 164.132.112.8 port 35082 ssh2
  112. Oct 9 22:51:40 vweb02 sshd[15479]: Invalid user apache from 164.132.112.8 port 47310
  113. Oct 9 22:51:40 vweb02 sshd[15479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8
  114. Oct 9 22:51:42 vweb02 sshd[15479]: Failed password for invalid user apache from 164.132.112.8 port 47310 ssh2
  115. Oct 9 22:51:42 vweb02 sshd[15479]: Received disconnect from 164.132.112.8 port 47310:11: Normal Shutdown, Thank you for playing [preauth]
  116. Oct 9 22:51:42 vweb02 sshd[15479]: Disconnected from 164.132.112.8 port 47310 [preauth]
  117. Oct 9 22:52:02 vweb02 sshd[15485]: Invalid user apache from 164.132.112.8 port 60154
  118. Oct 9 22:52:02 vweb02 sshd[15485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8
  119. Oct 9 22:52:03 vweb02 sshd[15485]: Failed password for invalid user apache from 164.132.112.8 port 60154 ssh2
  120. Oct 9 22:52:03 vweb02 sshd[15485]: Received disconnect from 164.132.112.8 port 60154:11: Normal Shutdown, Thank you for playing [preauth]
  121. Oct 9 22:52:03 vweb02 sshd[15485]: Disconnected from 164.132.112.8 port 60154 [preauth]
  122. Oct 9 22:52:23 vweb02 sshd[15570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8 user=mysql
  123.  
  124.  
  125.  
  126. Reply Reply to All Forward More
  127. Abuse lvlup.pro <abuse@lvlup.pro>
  128. To b.lytkowski@yahoo.com Oct 11 at 8:03 PM
  129. Dzień dobry
  130.  
  131. Otrzymaliśmy wiele zgłoszeń typu abuse dotyczących adresu IP używanego przez Państwa VPS.
  132. Nie odnotowaliśmy reakcji w tej sprawie więc usługa VPS zostaje zablokowana do czasu kontaktu z nami przez system zgłoszeń dostępny pod adresem:
  133. https://lvlup.pro/panel/support
  134.  
  135. Pozdrawiam
  136. Michał Frąckiewicz
  137.  
  138. Poniżej znajduje się kopia ostatnio otrzymanego zgłoszenia abuse:
  139.  
  140. ---------- Forwarded message ---------
  141. From: jlanhosting.com Abuse <alert@jlanhosting.com>
  142. Date: czw., 11 paź 2018 o 20:46
  143. Subject: Abuse from 164.132.112.8---
  144. To: <abuse@lvlup.pro>, <abuse@ovh.net>
  145.  
  146.  
  147. Dear Sir/Madam,
  148.  
  149. We have detected abuse from the IP address 164.132.112.8, which according to a whois lookup is on your network. We would appreciate if you would investigate and take action as appropriate.
  150.  
  151. Last 20 log lines are given below, but please ask if you require any further information.
  152.  
  153. (If you are not the correct person to contact about this please accept our apologies - your e-mail address was extracted from the whois record by an automated process. This mail was generated by Fail2Ban.)
  154.  
  155. Addresses to send to
  156. abuse@lvlup.pro,abuse@ovh.net
  157.  
  158. Note: Local timezone is +0300 (EEST)
  159. Oct 11 21:41:12 bxbsrv1 sshd[15915]: Did not receive identification string from 164.132.112.8
  160. Oct 11 21:43:39 bxbsrv1 sshd[18835]: Invalid user a from 164.132.112.8
  161. Oct 11 21:43:39 bxbsrv1 sshd[18835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8
  162. Oct 11 21:43:41 bxbsrv1 sshd[18835]: Failed password for invalid user a from 164.132.112.8 port 50612 ssh2
  163. Oct 11 21:43:41 bxbsrv1 sshd[18835]: Received disconnect from 164.132.112.8: 11: Normal Shutdown, Thank you for playing [preauth]
  164. Oct 11 21:44:26 bxbsrv1 sshd[19825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8 user=root
  165. Oct 11 21:44:28 bxbsrv1 sshd[19825]: Failed password for root from 164.132.112.8 port 34486 ssh2
  166. Oct 11 21:44:28 bxbsrv1 sshd[19825]: Received disconnect from 164.132.112.8: 11: Normal Shutdown, Thank you for playing [preauth]
  167. Oct 11 21:45:23 bxbsrv1 sshd[20895]: Invalid user oracle from 164.132.112.8
  168. Oct 11 21:45:23 bxbsrv1 sshd[20895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8
  169. Oct 11 21:45:25 bxbsrv1 sshd[20895]: Failed password for invalid user oracle from 164.132.112.8 port 49240 ssh2
  170. Oct 11 21:45:25 bxbsrv1 sshd[20895]: Received disconnect from 164.132.112.8: 11: Normal Shutdown, Thank you for playing [preauth]
  171. Oct 11 21:46:29 bxbsrv1 sshd[22306]: Invalid user nagios from 164.132.112.8
  172. Oct 11 21:46:29 bxbsrv1 sshd[22306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.112.8
  173. Oct 11 21:46:31 bxbsrv1 sshd[22306]: Failed password for invalid user nagios from 164.132.112.8 port 36236 ssh2
  174. Oct 11 21:46:31 bxbsrv1 sshd[22306]: Received disconnect from 164.132.112.8: 11: Normal Shutdown, Thank you for playing [preauth]
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement