[nsp-sec] SSH scanners are back
Gabriel Iovino
giovino at ren-isac.net
Fri Jan 22 13:34:23 EST 2010
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 1/22/2010 1:07 PM, Michael Sinatra wrote:
> ----------- nsp-security Confidential --------
>
> On 1/22/10 8:07 AM, Paul Dokas wrote:
>
>> The host was under a brute force SSH scan from 169.230.130.22
>> (cytobank.ucsf.edu)
>
> I'll see what I can do about the UCSF host. Seeing as how they do
> provide my health care, I have a vested interest. :)
Similar to default DENY... I typically "never say more than I need to"
which means I failed to mentioned that I have already reached out to
UCSF yesterday about that machine.
Sorry.
Gabe
- --
Gabriel Iovino
Principal Security Engineer, REN-ISAC
http://www.ren-isac.net
24x7 Watch Desk +1(317)278-6630
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAktZ768ACgkQwqygxIz+pTuAvACfWuWyOKu99qHBVmtJi/Ne/Pqc
vTkAn3VvT86P0yhKdcrUrS3qBicQVfrx
=UW70
-----END PGP SIGNATURE-----
More information about the nsp-security
mailing list