Allora, premesso che sui server che gestisco gli attacchi di tipo bruteforce sono all'ordine del giorno, oggi fail2ban ha cominciato ad imprecare in modo alquanto insistente.
Ma cosa ci sarà da strillare così tanto? Do un'occhiata ai file di log e mi accorgo che da ben 12 ore, un certo indirizzo IP sta provando a forzare il servizio SSH in ascolto sulle mie macchine.
Uhm, vediamo un po' cosa dice il mio amico fail2ban:
Hi,
The IP 174.132.*.* has just been banned by Fail2Ban after 6 attempts against ssh.
Here are more information about 174.132.*.*:
#
# Query terms are ambiguous. The query is assumed to be:
# "n 174.132.*.*"
#
# Use "?" to get help.
#
#
# The following results may also be obtained via:
# http://whois.arin.net/rest/nets;q=174.132.*.*?showDetails=true&showARIN=false
# NetRange: 174.132.0.0 - 174.133.255.255
CIDR: 174.132.0.0/15
OriginAS: AS36420, AS30315, AS13749, AS21844
NetName: NETBLK-THEPLANET-BLK-15
NetHandle: NET-174-132-0-0-1
Parent: NET-174-0-0-0-0
NetType: Direct Allocation
RegDate: 2008-06-17
Updated: 2008-06-17
Ref: http://whois.arin.net/rest/net/NET-174-132-0-0-1
OrgName: ThePlanet.com Internet Services, Inc.
OrgId: TPCM
Address: 315 Capitol
Address: Suite 205
City: Houston
StateProv: TX
PostalCode: 77002
Country: US
RegDate: 1999-08-31
Updated: 2010-10-13
Ref: http://whois.arin.net/rest/org/TPCM
ReferralServer: rwhois://rwhois.theplanet.com:4321
OrgNOCHandle: THEPL-ARIN
OrgNOCName: The Planet NOC
OrgNOCPhone: +1-281-822-4204
OrgNOCEmail: [email protected]
OrgNOCRef: http://whois.arin.net/rest/poc/THEPL-ARIN
OrgTechHandle: TECHN33-ARIN
OrgTechName: Technical Support
OrgTechPhone: +1-214-782-7800
OrgTechEmail: [email protected]
OrgTechRef: http://whois.arin.net/rest/poc/TECHN33-ARIN
OrgAbuseHandle: ABUSE271-ARIN
OrgAbuseName: The Planet Abuse
OrgAbusePhone: +1-281-714-3560
OrgAbuseEmail: [email protected]
OrgAbuseRef: http://whois.arin.net/rest/poc/ABUSE271-ARIN
RTechHandle: TECHN33-ARIN
RTechName: Technical Support
RTechPhone: +1-214-782-7800
RTechEmail: [email protected]
RTechRef: http://whois.arin.net/rest/poc/TECHN33-ARIN
RAbuseHandle: ABUSE271-ARIN
RAbuseName: The Planet Abuse
RAbusePhone: +1-281-714-3560
RAbuseEmail: [email protected]
RAbuseRef: http://whois.arin.net/rest/poc/ABUSE271-ARIN
RNOCHandle: THEPL-ARIN
RNOCName: The Planet NOC
RNOCPhone: +1-281-822-4204
RNOCEmail: [email protected]
RNOCRef: http://whois.arin.net/rest/poc/THEPL-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
# Found a referral to rwhois.theplanet.com:4321.
%rwhois V-1.5:003eff:00 whois.theplanet.com (by Network Solutions, Inc. V-1.5.9.5)
Network:Class-Name:network
network:ID:NETBLK-THEPLANET-BLK-15
network:Auth-Area:174.132.0.0/15
network:Network-Name:TPIS-BLK-174-132-*-0
network:IP-Network:174.132.*.*/29
network:IP-Network-Block:174.132.*.* - 174.132.*.*
network:Organization-Name:Mike Dillard
network:Organization-City:Austin
network:Organization-State:TX
network:Organization-Zip:78701
network:Organization-Country:USA
network:Description-Usage:customer
network:Server-Pri:ns1.theplanet.com
network:Server-Sec:ns2.theplanet.com
network:Tech-Contact;I:[email protected]
network:Admin-Contact;I:[email protected]
network:Created:20090204
network:Updated:20090216
%ok
Regards,
Fail2Ban
Ah che bello... finalmente un attacco che non proviene dal classico cinese smanettone. Ehm, però qui c'è qualcosa che non mi quadra (leggasi server farm), proviamo a fare un piccolo nmap su quell'indirizzo va:
nightfly@nightbox:~$ sudo proxychains nmap -sS 174.132.*.*
[sudo] password for nightfly:
ProxyChains-3.1 (http://proxychains.sf.net)
Starting Nmap 5.00 ( http://nmap.org ) at 2011-04-12 20:20 CEST
Interesting ports on **.ae.**ae.static.theplanet.com (174.132.*.*):
Not shown: 983 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
53/tcp open domain
80/tcp open http
106/tcp open pop3pw
110/tcp open pop3
111/tcp open rpcbind
143/tcp open imap
443/tcp open https
465/tcp open smtps
993/tcp open imaps
995/tcp open pop3s
1040/tcp open netsaint
1311/tcp open rxmon
3306/tcp open mysql
8443/tcp open https-alt
Vabbè ecco un'altra testa di ponte. Piccola mailina all'abuse e fine dei giochi. Bye.