I am getting a lot of log entries showing brute force attack on the router as shown below. I would like to know if:
- The attacker/s are actually getting ssh promt? I whitelisted only our IP addresses, but for some reason it looks like they are still getting to sshd.
- How to delete the extra log safely so I can see just the rest of the log.
Sometimes the user is root instead of unknown.
Thank you
Petr
output of sh log for just 1 minute.
Dec 17 09:29:01 hostname sshd[47440]: pam_unix(sshd:auth): check pass; user unknown
Dec 17 09:29:01 hostname sshd[47440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.53.170
Dec 17 09:29:04 hostname sshd[47443]: pam_unix(sshd:auth): check pass; user unknown
Dec 17 09:29:04 hostname sshd[47443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=aqg241.internetdsl.tpnet.pl
Dec 17 09:29:05 hostname sshd[47446]: pam_unix(sshd:auth): check pass; user unknown
Dec 17 09:29:05 hostname sshd[47446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.249.250.232
Dec 17 09:29:05 hostname sshd[47442]: pam_unix(sshd:auth): check pass; user unknown
Dec 17 09:29:05 hostname sshd[47442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.119.89
Dec 17 09:29:12 hostname sshd[47450]: pam_unix(sshd:auth): check pass; user unknown
Dec 17 09:29:12 hostname sshd[47450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.116
Dec 17 09:29:13 hostname sshd[47448]: pam_unix(sshd:auth): check pass; user unknown
Dec 17 09:29:13 hostname sshd[47448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.189.238.92
Dec 17 09:29:14 hostname sshd[47452]: pam_unix(sshd:auth): check pass; user unknown
Dec 17 09:29:14 hostname sshd[47452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.36.3.101
Dec 17 09:29:15 hostname sshd[47458]: pam_unix(sshd:auth): check pass; user unknown
Dec 17 09:29:15 hostname sshd[47458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.red-83-48-89.staticip.rima-tde.net
Dec 17 09:29:15 hostname sshd[47455]: pam_unix(sshd:auth): check pass; user unknown
Dec 17 09:29:15 hostname sshd[47455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.220.173.3
Dec 17 09:29:15 hostname sshd[47454]: pam_unix(sshd:auth): check pass; user unknown
Dec 17 09:29:15 hostname sshd[47454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.121.223.61
Dec 17 09:29:18 hostname sshd[47460]: pam_unix(sshd:auth): check pass; user unknown
Dec 17 09:29:18 hostname sshd[47460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.106.232
Dec 17 09:29:20 hostname sshd[47462]: pam_unix(sshd:auth): check pass; user unknown
Dec 17 09:29:20 hostname sshd[47462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-210-136-99.rev.poneytelecom.eu
Dec 17 09:29:25 hostname sshd[47547]: pam_unix(sshd:auth): check pass; user unknown
Dec 17 09:29:25 hostname sshd[47547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.120.166.129