-
Fototrend
TP-Link WDR3600 - N600 router
Új hozzászólás Aktív témák
-
donmackó
addikt
Üdv Urak!
Ez mit jelentene? Kezdhetek félni hogy valaki törni próbálja a routert?
Nov 7 09:17:55 OpenWrt daemon.info dnsmasq-dhcp[2397]: DHCPACK(br-lan) 192.168.1.174 e8:94:f6:d4:38:44 SamknowsWhitebox
Nov 7 09:56:48 OpenWrt kern.warn kernel: [151550.350000] BruteForce-SSH IN=eth0.2 OUT= MAC=64:66:b3:ce:1a:ce:44:32:c8:45:f6:70:08:00:45:00:00:30 SRC=222.186.34.164 DST=192.168.0.12 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=17456 DF PROTO=TCP SPT=1982 DPT=2222 WINDOW=65535 R
Nov 7 09:56:48 OpenWrt kern.warn kernel: [151550.370000] BruteForce-SSH IN=eth0.2 OUT= MAC=64:66:b3:ce:1a:ce:44:32:c8:45:f6:70:08:00:45:00:00:30 SRC=222.186.34.164 DST=192.168.0.12 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=17503 DF PROTO=TCP SPT=2013 DPT=2222 WINDOW=65535 R
Nov 7 09:56:49 OpenWrt authpriv.info dropbear[14482]: Child connection from 222.186.34.164:1963
Nov 7 09:56:49 OpenWrt authpriv.info dropbear[14481]: Child connection from 222.186.34.164:1926
Nov 7 09:56:51 OpenWrt kern.warn kernel: [151553.240000] BruteForce-SSH IN=eth0.2 OUT= MAC=64:66:b3:ce:1a:ce:44:32:c8:45:f6:70:08:00:45:00:00:30 SRC=222.186.34.164 DST=192.168.0.12 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=19292 DF PROTO=TCP SPT=2013 DPT=2222 WINDOW=65535 R
Nov 7 09:56:51 OpenWrt kern.warn kernel: [151553.260000] BruteForce-SSH IN=eth0.2 OUT= MAC=64:66:b3:ce:1a:ce:44:32:c8:45:f6:70:08:00:45:00:00:30 SRC=222.186.34.164 DST=192.168.0.12 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=19297 DF PROTO=TCP SPT=1982 DPT=2222 WINDOW=65535 R
Nov 7 09:56:56 OpenWrt authpriv.warn dropbear[14482]: Bad password attempt for 'root' from 222.186.34.164:1963
Nov 7 09:56:56 OpenWrt authpriv.warn dropbear[14481]: Bad password attempt for 'root' from 222.186.34.164:1926
Nov 7 09:56:57 OpenWrt authpriv.warn dropbear[14482]: Bad password attempt for 'root' from 222.186.34.164:1963
Nov 7 09:56:57 OpenWrt authpriv.warn dropbear[14481]: Bad password attempt for 'root' from 222.186.34.164:1926
Nov 7 09:56:58 OpenWrt authpriv.warn dropbear[14482]: Bad password attempt for 'root' from 222.186.34.164:1963
Nov 7 09:56:59 OpenWrt authpriv.warn dropbear[14481]: Bad password attempt for 'root' from 222.186.34.164:1926
Nov 7 09:57:00 OpenWrt authpriv.warn dropbear[14482]: Bad password attempt for 'root' from 222.186.34.164:1963
Nov 7 09:57:00 OpenWrt authpriv.warn dropbear[14481]: Bad password attempt for 'root' from 222.186.34.164:1926
Nov 7 09:57:01 OpenWrt authpriv.warn dropbear[14482]: Bad password attempt for 'root' from 222.186.34.164:1963
Nov 7 09:57:01 OpenWrt authpriv.warn dropbear[14481]: Bad password attempt for 'root' from 222.186.34.164:1926
Nov 7 09:57:02 OpenWrt authpriv.warn dropbear[14482]: Bad password attempt for 'root' from 222.186.34.164:1963
Nov 7 09:57:02 OpenWrt authpriv.warn dropbear[14481]: Bad password attempt for 'root' from 222.186.34.164:1926
Nov 7 09:57:03 OpenWrt authpriv.warn dropbear[14482]: Bad password attempt for 'root' from 222.186.34.164:1963
Nov 7 09:57:03 OpenWrt authpriv.warn dropbear[14481]: Bad password attempt for 'root' from 222.186.34.164:1926
Nov 7 09:57:04 OpenWrt authpriv.info dropbear[14482]: Exit before auth (user 'root', 7 fails): Error reading: Connection reset by peer
Nov 7 09:57:04 OpenWrt authpriv.info dropbear[14481]: Exit before auth (user 'root', 7 fails): Error reading: Connection reset by peerKernel napló:
[151550.350000] BruteForce-SSH IN=eth0.2 OUT= MAC=64:66:b3:ce:1a:ce:44:32:c8:45:f6:70:08:00:45:00:00:30 SRC=222.186.34.164 DST=192.168.0.12 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=17456 DF PROTO=TCP SPT=1982 DPT=2222 WINDOW=65535 RES=0x00 SYN URGP=0
[151550.370000] BruteForce-SSH IN=eth0.2 OUT= MAC=64:66:b3:ce:1a:ce:44:32:c8:45:f6:70:08:00:45:00:00:30 SRC=222.186.34.164 DST=192.168.0.12 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=17503 DF PROTO=TCP SPT=2013 DPT=2222 WINDOW=65535 RES=0x00 SYN URGP=0
[151553.240000] BruteForce-SSH IN=eth0.2 OUT= MAC=64:66:b3:ce:1a:ce:44:32:c8:45:f6:70:08:00:45:00:00:30 SRC=222.186.34.164 DST=192.168.0.12 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=19292 DF PROTO=TCP SPT=2013 DPT=2222 WINDOW=65535 RES=0x00 SYN URGP=0
[151553.260000] BruteForce-SSH IN=eth0.2 OUT= MAC=64:66:b3:ce:1a:ce:44:32:c8:45:f6:70:08:00:45:00:00:30 SRC=222.186.34.164 DST=192.168.0.12 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=19297 DF PROTO=TCP SPT=1982 DPT=2222 WINDOW=65535 RES=0x00 SYN URGP=0Bocs bele került pár érdektelen sor is a copy/paste-ba.
Új hozzászólás Aktív témák
- LENOVO LEGION 5 15AHP10 (83M0001MHV)
- Apple iPhone 13 Mini 128GB
- Macbook Pro 16" - 2020 gyártás, 6 mag i7, 16/512GB, Radeon 4GB, touchbar - garancia (66)
- Apple Watch Ultra 2 49mm GPS + Cellular - 98%, full dobz - Apple garancia (202)
- Samsung Galaxy Z Flip 5 8/256GB - Makulátlan állapot! - A szállítást állom!
- ÁRCSÖKKENTÉS ASUS HD6870 videókártya
- Apple iPhone 14 128GB,Használt,Adatkabelel,12 hónap garanciával
- GYÖNYÖRŰ iPhone 13 Pro 256GB Sierra Blue -1 ÉV GARANCIA - Kártyafüggetlen, MS3360
- Lenovo ThinkPad T14s Gen 3 i5-1245U 14" FHD+ 16GB 1TB 1 év teljeskörű garancia
- Azonnali készpénzes Intel i5 i7 i9 8xxx 9xxx processzor felvásárlás személyesen / csomagküldés
Állásajánlatok
Cég: BroadBit Hungary Kft.
Város: Budakeszi
Cég: PCMENTOR SZERVIZ KFT.
Város: Budapest

