TuckLive
April 25th, 2008, 02:46 PM
So the other day I checked my logs and I was being hammered on port 22. I don't think they got in, but I see some things in the log I am not sure about. Below is some samples of all the data.
Apr 23 06:25:01 computer CRON[16894]: pam_unix(cron:session): session opened for user root by (uid=0)
Apr 23 06:25:02 computer su[16925]: Successful su for nobody by root
Apr 23 06:25:02 computer su[16925]: + ??? root:nobody
Apr 23 06:25:02 computer su[16925]: pam_unix(su:session): session opened for user nobody by (uid=0)
Apr 23 06:25:02 computer su[16925]: pam_unix(su:session): session closed for user nobody
Apr 23 06:25:02 computer su[16927]: Successful su for nobody by root
Apr 23 06:25:02 computer su[16927]: + ??? root:nobody
Apr 23 06:25:02 computer su[16927]: pam_unix(su:session): session opened for user nobody by (uid=0)
Apr 23 06:25:02 computer su[16927]: pam_unix(su:session): session closed for user nobody
Apr 23 06:25:02 computer su[16929]: Successful su for nobody by root
Apr 23 06:25:02 computer su[16929]: + ??? root:nobody
Apr 23 06:25:02 computer su[16929]: pam_unix(su:session): session opened for user nobody by (uid=0)
Apr 23 06:26:03 computer su[16929]: pam_unix(su:session): session closed for user nobody
Apr 23 06:26:07 computer CRON[16894]: pam_unix(cron:session): session closed for user root
Apr 24 09:39:00 waiter sshd[21395]: pam_unix(ssh:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216-176-180-26.reverse.wowrack.com user=root
Apr 24 09:39:01 computer CRON[21397]: pam_unix(cron:session): session opened for user root by (uid=0)
Apr 24 09:39:01 computer CRON[21397]: pam_unix(cron:session): session closed for user root
Apr 24 09:39:02 computer sshd[21395]: Failed password for root from 216.176.180.26 port 36302 ssh2
I never see a successful logon from a hostile IP before I see this, so could this be the box itself? I'm not sure about the nobody user id.
Apr 25 06:17:01 computer CRON[24760]: pam_unix(cron:session): session opened for user root by (uid=0)
Apr 25 06:17:01 computer CRON[24760]: pam_unix(cron:session): session closed for user root
Apr 25 06:25:01 computer CRON[24771]: pam_unix(cron:session): session opened for user root by (uid=0)
Apr 25 06:25:01 computer su[24802]: Successful su for nobody by root
Apr 25 06:25:01 computer su[24802]: + ??? root:nobody
Apr 25 06:25:01 computer su[24802]: pam_unix(su:session): session opened for user nobody by (uid=0)
Apr 25 06:25:01 computer su[24802]: pam_unix(su:session): session closed for user nobody
Apr 25 06:25:01 computer su[24804]: Successful su for nobody by root
Apr 25 06:25:01 computer su[24804]: + ??? root:nobody
Apr 25 06:25:01 computer su[24804]: pam_unix(su:session): session opened for user nobody by (uid=0)
Apr 25 06:25:01 computer su[24804]: pam_unix(su:session): session closed for user nobody
Apr 25 06:25:01 computer su[24806]: Successful su for nobody by root
Apr 25 06:25:01 computer su[24806]: + ??? root:nobody
Apr 25 06:25:01 computer su[24806]: pam_unix(su:session): session opened for user nobody by (uid=0)
Apr 25 06:25:03 computer su[24806]: pam_unix(su:session): session closed for user nobody
Apr 25 06:25:07 computer CRON[24771]: pam_unix(cron:session): session closed for user root
Apr 25 06:39:01 computer CRON[24921]: pam_unix(cron:session): session opened for user root by (uid=0)
Apr 25 06:39:01 computer CRON[24921]: pam_unix(cron:session): session closed for user root
If anybody successfully got in, would it show the IP address everytime? Here is when I log in.
Apr 24 12:35:34 computer sshd[22864]: Accepted password for myaccount from 192.x.x.x port 47600 ssh2
Apr 24 12:35:34 computer sshd[22867]: pam_unix(ssh:session): session opened for user myaccount by (uid=0
Apr 23 06:25:01 computer CRON[16894]: pam_unix(cron:session): session opened for user root by (uid=0)
Apr 23 06:25:02 computer su[16925]: Successful su for nobody by root
Apr 23 06:25:02 computer su[16925]: + ??? root:nobody
Apr 23 06:25:02 computer su[16925]: pam_unix(su:session): session opened for user nobody by (uid=0)
Apr 23 06:25:02 computer su[16925]: pam_unix(su:session): session closed for user nobody
Apr 23 06:25:02 computer su[16927]: Successful su for nobody by root
Apr 23 06:25:02 computer su[16927]: + ??? root:nobody
Apr 23 06:25:02 computer su[16927]: pam_unix(su:session): session opened for user nobody by (uid=0)
Apr 23 06:25:02 computer su[16927]: pam_unix(su:session): session closed for user nobody
Apr 23 06:25:02 computer su[16929]: Successful su for nobody by root
Apr 23 06:25:02 computer su[16929]: + ??? root:nobody
Apr 23 06:25:02 computer su[16929]: pam_unix(su:session): session opened for user nobody by (uid=0)
Apr 23 06:26:03 computer su[16929]: pam_unix(su:session): session closed for user nobody
Apr 23 06:26:07 computer CRON[16894]: pam_unix(cron:session): session closed for user root
Apr 24 09:39:00 waiter sshd[21395]: pam_unix(ssh:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216-176-180-26.reverse.wowrack.com user=root
Apr 24 09:39:01 computer CRON[21397]: pam_unix(cron:session): session opened for user root by (uid=0)
Apr 24 09:39:01 computer CRON[21397]: pam_unix(cron:session): session closed for user root
Apr 24 09:39:02 computer sshd[21395]: Failed password for root from 216.176.180.26 port 36302 ssh2
I never see a successful logon from a hostile IP before I see this, so could this be the box itself? I'm not sure about the nobody user id.
Apr 25 06:17:01 computer CRON[24760]: pam_unix(cron:session): session opened for user root by (uid=0)
Apr 25 06:17:01 computer CRON[24760]: pam_unix(cron:session): session closed for user root
Apr 25 06:25:01 computer CRON[24771]: pam_unix(cron:session): session opened for user root by (uid=0)
Apr 25 06:25:01 computer su[24802]: Successful su for nobody by root
Apr 25 06:25:01 computer su[24802]: + ??? root:nobody
Apr 25 06:25:01 computer su[24802]: pam_unix(su:session): session opened for user nobody by (uid=0)
Apr 25 06:25:01 computer su[24802]: pam_unix(su:session): session closed for user nobody
Apr 25 06:25:01 computer su[24804]: Successful su for nobody by root
Apr 25 06:25:01 computer su[24804]: + ??? root:nobody
Apr 25 06:25:01 computer su[24804]: pam_unix(su:session): session opened for user nobody by (uid=0)
Apr 25 06:25:01 computer su[24804]: pam_unix(su:session): session closed for user nobody
Apr 25 06:25:01 computer su[24806]: Successful su for nobody by root
Apr 25 06:25:01 computer su[24806]: + ??? root:nobody
Apr 25 06:25:01 computer su[24806]: pam_unix(su:session): session opened for user nobody by (uid=0)
Apr 25 06:25:03 computer su[24806]: pam_unix(su:session): session closed for user nobody
Apr 25 06:25:07 computer CRON[24771]: pam_unix(cron:session): session closed for user root
Apr 25 06:39:01 computer CRON[24921]: pam_unix(cron:session): session opened for user root by (uid=0)
Apr 25 06:39:01 computer CRON[24921]: pam_unix(cron:session): session closed for user root
If anybody successfully got in, would it show the IP address everytime? Here is when I log in.
Apr 24 12:35:34 computer sshd[22864]: Accepted password for myaccount from 192.x.x.x port 47600 ssh2
Apr 24 12:35:34 computer sshd[22867]: pam_unix(ssh:session): session opened for user myaccount by (uid=0