LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 01-11-2016, 01:40 AM   #1
noob__
LQ Newbie
 
Registered: Apr 2014
Posts: 12

Rep: Reputation: Disabled
Possible attacks?


I have these lines every day on my dmz logs(with different SRC ips and different rates 20-30 per day)


Code:
Jan 11 06:50:28 hostname kernel: [1890275.573817] IN=eth0 OUT= MAC=00:11:22:33:44:55:66:77:88:99:aa:bb:cc:dd SRC=115.231.232.196 DST=192.168.1.2 LEN=44 TOS=0x00 PREC=0x00 TTL=111 ID=256 PROTO=TCP SPT=61817 DPT=3306 WINDOW=16384 RES=0x00 SYN URGP=0 
Jan 11 07:11:28 hostname kernel: [1891536.190667] IN=eth0 OUT= MAC=00:11:22:33:44:55:66:77:88:99:aa:bb:cc:dd SRC=115.231.232.196 DST=192.168.1.2 LEN=44 TOS=0x00 PREC=0x00 TTL=111 ID=256 PROTO=TCP SPT=48647 DPT=3306 WINDOW=16384 RES=0x00 SYN URGP=0 
Jan 11 08:20:35 hostname kernel: [1895687.074526] IN=eth0 OUT= MAC=00:11:22:33:44:55:66:77:88:99:aa:bb:cc:dd SRC=23.251.47.12 DST=192.168.1.2 LEN=44 TOS=0x00 PREC=0x00 TTL=118 ID=256 PROTO=TCP SPT=21001 DPT=3306 WINDOW=16384 RES=0x00 SYN URGP=0 
Jan 11 08:41:49 hostname kernel: [1896961.769624] IN=eth0 OUT= MAC=00:11:22:33:44:55:66:77:88:99:aa:bb:cc:dd SRC=180.97.215.57 DST=192.168.1.2 LEN=44 TOS=0x00 PREC=0x00 TTL=102 ID=256 PROTO=TCP SPT=6000 DPT=3306 WINDOW=16384 RES=0x00 SYN URGP=0 
Jan 11 08:58:16 hostname kernel: [1897949.369162] IN=eth0 OUT= MAC=00:11:22:33:44:55:66:77:88:99:aa:bb:cc:dd SRC=61.160.215.16 DST=192.168.1.2 LEN=44 TOS=0x00 PREC=0x00 TTL=103 ID=256 PROTO=TCP SPT=6000 DPT=3306 WINDOW=16384 RES=0x00 SYN URGP=0 
Jan 11 09:20:01 hostname kernel: [1899255.303235] IN=eth0 OUT= MAC=00:11:22:33:44:55:66:77:88:99:aa:bb:cc:dd SRC=61.160.23.222 DST=192.168.1.2 LEN=44 TOS=0x00 PREC=0x00 TTL=103 ID=256 PROTO=TCP SPT=6000 DPT=3306 WINDOW=16384 RES=0x00 SYN URGP=0 
Jan 11 09:21:06 hostname kernel: [1899321.112924] IN=eth0 OUT= MAC=00:11:22:33:44:55:66:77:88:99:aa:bb:cc:dd SRC=61.160.215.16 DST=192.168.1.2 LEN=44 TOS=0x00 PREC=0x00 TTL=103 ID=256 PROTO=TCP SPT=6000 DPT=3306 WINDOW=16384 RES=0x00 SYN URGP=0
Are these attacks?

Last edited by noob__; 01-11-2016 at 01:41 AM.
 
Old 01-11-2016, 03:07 AM   #2
dh2k
Member
 
Registered: Jan 2006
Distribution: Slackware 13.0 (KDE 3.5.10 from 12.2; Xfce 4.6; Fluxbox); Slackware 13.1 (KDE 4.5)
Posts: 211

Rep: Reputation: 52
Possible attacks?

Welcome to internetz !!!
and our Chinese friends [sic].

use whois
fail2ban
iptables
and some background reading in creating some white and blacklists.
 
1 members found this post helpful.
Old 01-11-2016, 06:30 AM   #3
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
Every single entry that is shown is a China IP (SRC=) trying to gain access to MySQL (DPT=3306)

Sure hope you don't have a wildcard placeholder for host for any user with privileges
eg:
Code:
grant ALL to dev_wants_root@'%' identified by 'weak_ass_password'
And this wildcard host should NEVER be allowed for mysql_root.
Modern installations of mysql force run the security/hardening script.
It removes % for mysql_root, I believe and sets passwords for accounts that don't have one.

Other accounts you'll have to manually inspect with
Code:
mysql -uroot -p -e "use mysql; select user,host from user where host = '%';"
Good Luck.

Last edited by Habitual; 01-11-2016 at 10:01 AM.
 
Old 01-11-2016, 09:42 AM   #4
dh2k
Member
 
Registered: Jan 2006
Distribution: Slackware 13.0 (KDE 3.5.10 from 12.2; Xfce 4.6; Fluxbox); Slackware 13.1 (KDE 4.5)
Posts: 211

Rep: Reputation: 52
Possible attacks?

may also be worth checking, in /var/log/ , your:
auth.log
syslog.log
message.log
 
Old 01-11-2016, 09:51 AM   #5
dh2k
Member
 
Registered: Jan 2006
Distribution: Slackware 13.0 (KDE 3.5.10 from 12.2; Xfce 4.6; Fluxbox); Slackware 13.1 (KDE 4.5)
Posts: 211

Rep: Reputation: 52
Possible attacks?

Unit 61398? maybe, maybe not. Either way do u have reasons for that block of IPv4 address to be reaching your server? If not then blacklist them (country) and other 'black' IP neighbour hoods.
 
Old 01-11-2016, 10:09 AM   #6
noob__
LQ Newbie
 
Registered: Apr 2014
Posts: 12

Original Poster
Rep: Reputation: Disabled
Thx guys, i don't have any wildcard placeholder.

Quote:
Originally Posted by dh2k View Post
Unit 61398? maybe, maybe not. Either way do u have reasons for that block of IPv4 address to be reaching your server? If not then blacklist them (country) and other 'black' IP neighbour hoods.
No, I will ban some blocks of ip.
 
Old 01-11-2016, 11:38 AM   #7
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
Glad to be of help.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Hello / DDoS attacks cybernet2u Linux - Security 7 11-21-2009 09:30 PM
Virus Attacks john036 General 6 07-19-2007 03:56 PM
Security Attacks LinuxRam Linux - Security 2 08-24-2004 03:14 AM
Attacks : 80% from the inside? iainr Linux - Security 2 04-25-2004 04:02 PM
IP attacks sundarrnathan Linux - Security 1 06-04-2003 05:33 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 09:40 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration