首页 > Linux安全防护 > Received disconnect from; pam_unix(sshd:auth): authentication failure;

Received disconnect from; pam_unix(sshd:auth): authentication failure;

2015年9月18日

Received disconnect from; pam_unix(sshd:auth): authentication failure;
http://www.54sa.com/linux/security/201103071912.html
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=loft4217.serverloft.com user=root
vi /etc/hosts.deny
#
# hosts.deny This file describes the names of the hosts which are
# *not* allowed to use the local INET services, as decided
# by the ‘/usr/sbin/tcpd’ server.
#
# The portmap line is redundant, but it is left to remind you that
# the new secure portmap uses hosts.deny and hosts.allow. In particular
#
# hosts.deny This file describes the names of the hosts which are
# *not* allowed to use the local INET services, as decided
# by the ‘/usr/sbin/tcpd’ server.
#
# The portmap line is redundant, but it is left to remind you that
# the new secure portmap uses hosts.deny and hosts.allow. In particular
# you should know that NFS uses portmap!
sshd: 195.144.226.76
sshd: 85.114.135.81
sshd: 58.251.56.233
sshd: 121.10.243.25
sshd: 71.91.140.118
sshd: 200.170.216.219
sshd: 58.49.104.164
sshd: 217.172.182.194
sshd: 222.82.250.164
sshd: 112.90.144.218
sshd: 113.105.159.162
sshd: 81.74.83.210
sshd: 66.11.123.195
sshd: 122.183.91.87
sshd: 125.90.88.153
sshd: 218.246.125.130
sshd: 83.166.144.15
sshd: 208.94.99.138
sshd: 186.115.4.27
sshd: 210.51.59.71
sshd: 116.55.227.91
sshd: 61.187.56.27
sshd: 217.172.180.219
sshd: 173.15.144.194
sshd: 81.19.4.152
sshd: 218.80.254.142
sshd: 65.75.128.151
sshd: 180.171.34.213
sshd: 178.162.151.212
sshd: 61.19.242.52
sshd: 61.219.69.10
sshd: 117.79.82.91
sshd: 221.7.196.68
sshd: 188.138.24.146
sshd: 66.197.161.21
sshd: 119.149.189.52
sshd: 49.212.7.205
sshd: 213.229.99.131
sshd: 188.138.16.254
sshd: 121.28.179.10

分类: Linux安全防护 标签:
本文的评论功能被关闭了.