找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
广告投放联系QQ68610888
查看: 1405|回复: 7

[openwrt(x86)] 真是TM的臭无聊 臭狗屎

[复制链接]
发表于 2023-5-8 09:31 | 显示全部楼层 |阅读模式
Mon May  8 09:06:39 2023 authpriv.warn dropbear[2405]: Login attempt for nonexistent user
Mon May  8 09:06:40 2023 authpriv.info dropbear[2405]: Exit before auth from <134.122.74.24:37636>: Exited normally
Mon May  8 09:07:38 2023 authpriv.info dropbear[3355]: Child connection from 195.226.194.142:23974
Mon May  8 09:07:39 2023 authpriv.warn dropbear[3355]: Login attempt for nonexistent user
Mon May  8 09:07:40 2023 authpriv.info dropbear[3355]: Exit before auth from <195.226.194.142:23974>: Disconnect received
Mon May  8 09:08:43 2023 authpriv.info dropbear[4377]: Child connection from 134.122.74.24:43538
Mon May  8 09:08:43 2023 authpriv.warn dropbear[4377]: Login attempt for nonexistent user
Mon May  8 09:08:45 2023 authpriv.info dropbear[4377]: Exit before auth from <134.122.74.24:43538>: Exited normally
Mon May  8 09:08:59 2023 authpriv.info dropbear[4630]: Child connection from 190.2.147.48:39500
Mon May  8 09:09:01 2023 authpriv.warn dropbear[4630]: Bad password attempt for 'root' from 190.2.147.48:39500
Mon May  8 09:09:01 2023 authpriv.info dropbear[4630]: Exit before auth from <190.2.147.48:39500>: (user 'root', 1 fails): Error reading: Connection reset by peer
Mon May  8 09:10:46 2023 authpriv.info dropbear[6297]: Child connection from 134.122.74.24:44162
Mon May  8 09:10:47 2023 authpriv.warn dropbear[6297]: Login attempt for nonexistent user
Mon May  8 09:10:48 2023 authpriv.info dropbear[6297]: Exit before auth from <134.122.74.24:44162>: Exited normally
Mon May  8 09:12:50 2023 authpriv.info dropbear[8257]: Child connection from 134.122.74.24:51358
Mon May  8 09:12:52 2023 authpriv.warn dropbear[8257]: Login attempt for nonexistent user
Mon May  8 09:12:53 2023 authpriv.info dropbear[8257]: Exit before auth from <134.122.74.24:51358>: Exited normally
Mon May  8 09:13:36 2023 authpriv.info dropbear[8980]: Child connection from 193.105.134.95:61532
Mon May  8 09:13:38 2023 authpriv.warn dropbear[8980]: Bad password attempt for 'root' from 193.105.134.95:61532
Mon May  8 09:13:38 2023 authpriv.info dropbear[8980]: Exit before auth from <193.105.134.95:61532>: (user 'root', 1 fails): Error reading: Connection reset by peer
Mon May  8 09:14:50 2023 authpriv.info dropbear[10132]: Child connection from 134.122.74.24:47090
Mon May  8 09:14:50 2023 authpriv.warn dropbear[10132]: Login attempt for nonexistent user
Mon May  8 09:14:52 2023 authpriv.info dropbear[10132]: Exit before auth from <134.122.74.24:47090>: Exited normally
Mon May  8 09:16:51 2023 authpriv.info dropbear[12043]: Child connection from 134.122.74.24:38860
Mon May  8 09:16:52 2023 authpriv.warn dropbear[12043]: Login attempt for nonexistent user
Mon May  8 09:16:53 2023 authpriv.info dropbear[12043]: Exit before auth from <134.122.74.24:38860>: Exited normally
Mon May  8 09:17:19 2023 authpriv.info dropbear[12480]: Child connection from 89.39.105.84:41942
Mon May  8 09:17:20 2023 authpriv.warn dropbear[12480]: Bad password attempt for 'root' from 89.39.105.84:41942
Mon May  8 09:17:21 2023 authpriv.info dropbear[12480]: Exit before auth from <89.39.105.84:41942>: (user 'root', 1 fails): Error reading: Connection reset by peer
Mon May  8 09:17:37 2023 authpriv.info dropbear[12755]: Child connection from 107.170.239.9:43134
Mon May  8 09:17:48 2023 authpriv.info dropbear[12755]: Exit before auth from <107.170.239.9:43134>: Exited normally
Mon May  8 09:18:53 2023 authpriv.info dropbear[13943]: Child connection from 134.122.74.24:54922
Mon May  8 09:18:54 2023 authpriv.warn dropbear[13943]: Login attempt for nonexistent user
Mon May  8 09:18:55 2023 authpriv.info dropbear[13943]: Exit before auth from <134.122.74.24:54922>: Exited normally
Mon May  8 09:19:12 2023 authpriv.info dropbear[14252]: Child connection from 164.90.233.55:61000
Mon May  8 09:19:12 2023 authpriv.info dropbear[14252]: Exit before auth from <164.90.233.55:61000>: Exited normally
Mon May  8 09:19:31 2023 authpriv.info dropbear[14546]: Child connection from 62.112.11.68:29608
Mon May  8 09:19:33 2023 authpriv.warn dropbear[14546]: Bad password attempt for 'root' from 62.112.11.68:29608
Mon May  8 09:19:33 2023 authpriv.info dropbear[14546]: Exit before auth from <62.112.11.68:29608>: (user 'root', 1 fails): Error reading: Connection reset by peer
Mon May  8 09:19:52 2023 authpriv.info dropbear[14836]: Child connection from 190.2.144.45:49990
Mon May  8 09:19:59 2023 authpriv.warn dropbear[14836]: Bad password attempt for 'root' from 190.2.144.45:49990
Mon May  8 09:20:00 2023 authpriv.info dropbear[14836]: Exit before auth from <190.2.144.45:49990>: (user 'root', 1 fails): Error reading: Connection reset by peer
Mon May  8 09:20:54 2023 authpriv.info dropbear[15838]: Child connection from 134.122.74.24:43910
Mon May  8 09:20:55 2023 authpriv.warn dropbear[15838]: Login attempt for nonexistent user
Mon May  8 09:20:56 2023 authpriv.info dropbear[15838]: Exit before auth from <134.122.74.24:43910>: Exited normally
Mon May  8 09:21:00 2023 user.info : luci: accepted login on / for root from 192.168.1.83
Mon May  8 09:22:57 2023 authpriv.info dropbear[18191]: Child connection from 134.122.74.24:50900
Mon May  8 09:22:58 2023 authpriv.warn dropbear[18191]: Login attempt for nonexistent user
Mon May  8 09:22:59 2023 authpriv.info dropbear[18191]: Exit before auth from <134.122.74.24:50900>: Exited normally
Mon May  8 09:24:57 2023 authpriv.info dropbear[20074]: Child connection from 134.122.74.24:57584
Mon May  8 09:24:58 2023 authpriv.warn dropbear[20074]: Login attempt for nonexistent user
Mon May  8 09:24:59 2023 authpriv.info dropbear[20074]: Exit before auth from <134.122.74.24:57584>: Exited normally
Mon May  8 09:25:24 2023 authpriv.info dropbear[20494]: Child connection from 114.32.244.186:50021
Mon May  8 09:25:25 2023 authpriv.warn dropbear[20494]: Login attempt for nonexistent user
Mon May  8 09:25:28 2023 authpriv.info dropbear[20494]: Exit before auth from <114.32.244.186:50021>: Max auth tries reached - user 'is invalid'
Mon May  8 09:25:54 2023 authpriv.info dropbear[20960]: Child connection from 109.236.89.72:59081
Mon May  8 09:25:56 2023 authpriv.warn dropbear[20960]: Bad password attempt for 'root' from 109.236.89.72:59081
Mon May  8 09:25:57 2023 authpriv.info dropbear[20960]: Exit before auth from <109.236.89.72:59081>: (user 'root', 1 fails): Error reading: Connection reset by peer
最无聊的是把我以前用的默认密码直接把我的网心云docker改成它自己的  

发表于 2023-5-8 10:04 | 显示全部楼层
看不懂是留后门了吗?
回复

使用道具 举报

发表于 2023-5-8 13:25 | 显示全部楼层
看不懂,暴力破解了root密码?还是开ssh不安全?
回复

使用道具 举报

 楼主| 发表于 2023-5-8 19:40 | 显示全部楼层
2063952 发表于 2023-5-8 10:04
看不懂是留后门了吗?

不知道用的 iStoreOS 固件
回复

使用道具 举报

 楼主| 发表于 2023-5-8 19:43 | 显示全部楼层
华茂春松 发表于 2023-5-8 13:25
看不懂,暴力破解了root密码?还是开ssh不安全?

一直尝试用ssh的22端口用各种密码登陆    关了SSH一天了没有这种日志了
回复

使用道具 举报

发表于 2023-5-8 21:03 | 显示全部楼层
q865945646 发表于 2023-5-8 19:43
一直尝试用ssh的22端口用各种密码登陆    关了SSH一天了没有这种日志了

很常见吧,把设备挂到网上被扫撞库很正常。我的平时把ssh都关了。那些高危端口也封住
回复

使用道具 举报

发表于 2023-5-8 21:08 | 显示全部楼层
只要开放出去就会被扫,都是bot在扫。得上防ddos的
回复

使用道具 举报

发表于 2023-5-9 08:30 | 显示全部楼层
XanaduNWH 发表于 2023-5-8 21:08
只要开放出去就会被扫,都是bot在扫。得上防ddos的

对,什么流量清洗,防火墙,入侵防御,web应用防护都来一套
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

欢迎大家光临恩山无线论坛上一条 /1 下一条

有疑问请添加管理员QQ86788181|手机版|小黑屋|Archiver|恩山无线论坛(常州市恩山计算机开发有限公司版权所有) ( 苏ICP备05084872号 )

GMT+8, 2024-5-25 13:26

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

| 江苏省互联网有害信息举报中心 举报信箱:js12377 | @jischina.com.cn 举报电话:025-88802724 本站不良内容举报信箱:68610888@qq.com 举报电话:0519-86695797

快速回复 返回顶部 返回列表