Server Attack by this IP 87.118.123.184

My server Attack by these two Ip Address This morning. causing the website to acting very funny.. Very slow and 500 internal error.. They were successful login into the server.



IP:      87.118.123.184 (DE/Germany/ns2.km32901-01.keymachine.de)
Account: root
Method:  keyboard-interactive/pam authentication


Time:    Sun Apr  7 08:15:46 2013 -0500
IP:      37.14.240.68 (ES/Spain/68.240.14.37.dynamic.jazztel.es)
Account: root
Method:  keyboard-interactive/pam authentication


Quote · 7 Apr 2013

Change all your passwords to 12 - 16 character randomly generated passwords containing upper and lower case letters plus numbers.  Symbols if your server allows.

cPanel, FTP, Emails, MySql, PhpAdmin.

I get "attacks" all the time on mine. I end up blocking the entire block of IP addresses they originate from in my cPanel.

I don't get hammered by spam tho!  ;)

http://www.mytikibar.com
Quote · 7 Apr 2013

Brute force attacks are common - our shared is hit with 100s every day.  The remedy is (as said by Steve):

  1. Strong passwords
  2. Brute force protection (e.g., block IP after x failed attempts)

 

My recommendation is to reinstall the server and start over with stronger passwords.  You can go even further and change the port for SSH, allow root logins for only whitelisted IPs, etc.

BoonEx Certified Host: Zarconia.net - Fully Supported Shared and Dedicated for Dolphin
Quote · 7 Apr 2013

I agree with Nathan.

If they did indeed get in, your best course of action is to restore the entire server. OS and all. They break in for a reason. So something was placed on the server somewhere.

Your password is your first and best line of defense. If you have a strong password they most likely will not get in. And yes, the SSH port should be changed from it's default. It helps reduce the attempts.

Use passwords like the ones you can generate at this site. http://strongpasswordgenerator.com/ Passwords such as this. s7vQI*yE1A42(PY are strong and pretty much impossible to crack by guessing and brute-force attacks.



https://www.deanbassett.com
Quote · 7 Apr 2013

Thank you For the advice :) but the old password was pretty  strong   I guess "xq@H1L&t5N*THM.7?hcax".

Quote · 8 Apr 2013

If that was the password, I would not think they brute force their way in then.  Which would have me looking to see how they got in.

Geeks, making the world a better place
Quote · 8 Apr 2013
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.