To avoid useless search engine crawler entries, you may specify option
id=ipaddr
to
this script to obtain the logfiles associated with this IP address.
You can also specify link
to make this script make links for each
entry. If you're curious about country breakdown, try specifying
country
. Currently China loses the most, then the USA, and
Korea is quickly catching up. Also I have to say the US Educational system
seems to have mostly kept their networks clean, three cheers for those admins
to keep that up.
I don't auto-remove entries - these were from when I started keeping track of these attempts.
You may wonder why I post this here? Could this list be exploited? Why yes! I hope that perhaps another botnet master finds that host and breaks into it too. And hopefully they will have enough conflicting software to cause that machine to crash or become ''painfully'' obvious that it has been compromised. My goal is to have as many zombie bots removed from the network as I can, and if someone double hacks the machine and brings it to its knees...well, at least it's off the net.
Note: machines may continue to try to bruteforce my machine after the logfiles shown here. I filter out these addresses after seeing them, so they may appear to stop. At some later date I'll include subsequent attempts.
Look into the package 'Fail2ban' if you want some automated protection system. I'm just manually doing it to my hosts.deny and IP tables.
This has been discontinued for now.