[nsp-sec] SSH scanners are back

Gabriel Iovino giovino at ren-isac.net
Fri Jan 22 13:34:23 EST 2010


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 1/22/2010 1:07 PM, Michael Sinatra wrote:
> ----------- nsp-security Confidential --------
> 
> On 1/22/10 8:07 AM, Paul Dokas wrote:
> 
>> The host was under a brute force SSH scan from 169.230.130.22
>> (cytobank.ucsf.edu)
> 
> I'll see what I can do about the UCSF host.  Seeing as how they do
> provide my health care, I have a vested interest. :)

Similar to default DENY... I typically "never say more than I need to"
which means I failed to mentioned that I have already reached out to
UCSF yesterday about that machine.

Sorry.

Gabe

- --
Gabriel Iovino
Principal Security Engineer, REN-ISAC
http://www.ren-isac.net
24x7 Watch Desk +1(317)278-6630


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAktZ768ACgkQwqygxIz+pTuAvACfWuWyOKu99qHBVmtJi/Ne/Pqc
vTkAn3VvT86P0yhKdcrUrS3qBicQVfrx
=UW70
-----END PGP SIGNATURE-----



More information about the nsp-security mailing list