找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
广告投放联系QQ68610888
查看: 2827|回复: 2

请教论坛上的告诉,我的DD-WRT是不是一直在被攻击

[复制链接]
从系统日志里截取的,一直有几个IP论坛远程登录,有没有办法限制远程可以访问的IP地址,最好是MAC地址,拒绝这些访问攻击?一直被攻击,路由器总是重启,很烦躁啊。
类似这样的记录:
Jul 23 12:36:00 R6300v2 authpriv.warn dropbear[2082]: Login attempt for nonexistent user from 221.8.62.158:41351
Jul 23 12:36:01 R6300v2 authpriv.info dropbear[2082]: Exit before auth: Disconnect received
Jul 23 12:36:05 R6300v2 authpriv.warn dropbear[2104]: Login attempt for nonexistent user from 221.8.62.158:42054
Jul 23 12:36:06 R6300v2 authpriv.info dropbear[2104]: Exit before auth: Disconnect received


[size=1em][size=1em][size=1em]
[size=1em][size=1em]



[size=1em][size=1em][size=1em]System Log
Jul 23 12:55:20 R6300v2 authpriv.warn dropbear[3140]: Login attempt for nonexistent user from 116.10.191.186:4635
Jul 23 12:55:20 R6300v2 authpriv.warn dropbear[3138]: Bad password attempt for 'root' from 116.10.191.186:3829
Jul 23 12:55:20 R6300v2 authpriv.warn dropbear[3137]: Bad password attempt for 'root' from 116.10.191.186:3786
Jul 23 12:55:20 R6300v2 authpriv.warn dropbear[3141]: Bad password attempt for 'root' from 116.10.191.186:5865
Jul 23 12:55:20 R6300v2 authpriv.warn dropbear[3140]: Login attempt for nonexistent user from 116.10.191.186:4635
Jul 23 12:55:20 R6300v2 authpriv.warn dropbear[3137]: Bad password attempt for 'root' from 116.10.191.186:3786
Jul 23 12:55:20 R6300v2 authpriv.warn dropbear[3138]: Bad password attempt for 'root' from 116.10.191.186:3829
Jul 23 12:55:20 R6300v2 authpriv.warn dropbear[3141]: Bad password attempt for 'root' from 116.10.191.186:5865
Jul 23 12:55:21 R6300v2 authpriv.warn dropbear[3140]: Login attempt for nonexistent user from 116.10.191.186:4635
Jul 23 12:55:21 R6300v2 authpriv.warn dropbear[3137]: Bad password attempt for 'root' from 116.10.191.186:3786
Jul 23 12:55:21 R6300v2 authpriv.warn dropbear[3138]: Bad password attempt for 'root' from 116.10.191.186:3829
Jul 23 12:55:21 R6300v2 authpriv.warn dropbear[3140]: Login attempt for nonexistent user from 116.10.191.186:4635
Jul 23 12:55:21 R6300v2 authpriv.warn dropbear[3141]: Bad password attempt for 'root' from 116.10.191.186:5865
Jul 23 12:55:21 R6300v2 authpriv.info dropbear[3137]: Exit before auth (user 'root', 10 fails): Max auth tries reached - user 'root' from 116.10.191.186:3786
Jul 23 12:55:21 R6300v2 authpriv.warn dropbear[3138]: Bad password attempt for 'root' from 116.10.191.186:3829
Jul 23 12:55:21 R6300v2 authpriv.warn dropbear[3140]: Login attempt for nonexistent user from 116.10.191.186:4635
Jul 23 12:55:21 R6300v2 authpriv.warn dropbear[3141]: Bad password attempt for 'root' from 116.10.191.186:5865
Jul 23 12:55:22 R6300v2 authpriv.info dropbear[3138]: Exit before auth (user 'root', 10 fails): Max auth tries reached - user 'root' from 116.10.191.186:3829
Jul 23 12:55:22 R6300v2 authpriv.warn dropbear[3140]: Login attempt for nonexistent user from 116.10.191.186:4635
Jul 23 12:55:22 R6300v2 authpriv.warn dropbear[3141]: Bad password attempt for 'root' from 116.10.191.186:5865
Jul 23 12:55:22 R6300v2 authpriv.warn dropbear[3140]: Login attempt for nonexistent user from 116.10.191.186:4635
Jul 23 12:55:22 R6300v2 authpriv.warn dropbear[3141]: Bad password attempt for 'root' from 116.10.191.186:5865
Jul 23 12:55:23 R6300v2 authpriv.warn dropbear[3140]: Login attempt for nonexistent user from 116.10.191.186:4635
Jul 23 12:55:23 R6300v2 authpriv.warn dropbear[3141]: Bad password attempt for 'root' from 116.10.191.186:5865
Jul 23 12:55:23 R6300v2 authpriv.warn dropbear[3140]: Login attempt for nonexistent user from 116.10.191.186:4635
Jul 23 12:55:23 R6300v2 authpriv.warn dropbear[3141]: Bad password attempt for 'root' from 116.10.191.186:5865
Jul 23 12:55:23 R6300v2 authpriv.warn dropbear[3144]: Bad password attempt for 'root' from 116.10.191.186:7703
Jul 23 12:55:24 R6300v2 authpriv.warn dropbear[3140]: Login attempt for nonexistent user from 116.10.191.186:4635
Jul 23 12:55:24 R6300v2 authpriv.info dropbear[3145]: Exit before auth: Error reading: Connection reset by peer
Jul 23 12:55:24 R6300v2 authpriv.info dropbear[3144]: Exit before auth (user 'root', 1 fails): Error reading: Connection reset by peer
Jul 23 12:55:24 R6300v2 authpriv.info dropbear[3141]: Exit before auth (user 'root', 8 fails): Error reading: Connection reset by peer
Jul 23 12:55:24 R6300v2 authpriv.info dropbear[3140]: Exit before auth: Max auth tries reached - user 'is invalid' from 116.10.191.186:4635








[size=1em][size=1em]固件: [size=1em][url=http://anna0830.chickenkiller.com/Syslog.aspjavascriptpenAboutWindow()]DD-WRT v24-sp2 (06/13/14) kongac[/url]
[size=1em]时间: [size=1em]12:56:33 up 22 min, load average: 4.36, 4.12, 3.04
[size=1em]WAN[size=1em] IP: XXXXXXXXXXXXXX






看不懂请大神指点吧
回复

使用道具 举报

本帖最后由 kuenwai 于 2014-7-31 10:17 编辑

在路由器的 服务 里,
SSHd
  禁用
Telnet
  禁用

然后在 管理
远程管理

Web界面管理
禁用
SSH管理
禁用
Telnet管理
禁 用
允许任意远程IP地址
启用
允许远程IP地址范围(然后输入你电脑的IP段)
如192.168.1.2终止于10意思就是 只有IP是192.168.1.2到10的才能进管理网页

SSHd和Telnet不用的话就禁用,如果要开启,请改端口(将22/23改掉)如23512之类的

还有路由器的登陆密码不要过于简单
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

欢迎大家光临恩山无线论坛上一条 /1 下一条

有疑问请添加管理员QQ86788181|手机版|小黑屋|Archiver|恩山无线论坛(常州市恩山计算机开发有限公司版权所有) ( 苏ICP备05084872号 )

GMT+8, 2024-5-12 08:56

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

| 江苏省互联网有害信息举报中心 举报信箱:js12377 | @jischina.com.cn 举报电话:025-88802724 本站不良内容举报信箱:68610888@qq.com 举报电话:0519-86695797

快速回复 返回顶部 返回列表