This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Is anyone else seeing alerts about failed ssh logins for username anyone?

I'm getting notifications for several UTMs across several customers, with this alert: "Failed SSH login attempt from xxx.xxx.xxx.xxx  at 2017-10-22 22:28:38 with username anyname". For one customer, the alert indicates the IP address of a hyper-v host server, but the rest of the alerts are all from their DC (although for those customers, the DC is also their only server). 

I thought at first it was bug, but the UTMs are at different version levels. Is there some SSH exploit that I'm not aware of? 



This thread was automatically locked due to age.
Parents Reply Children
  • While this apijnappels input is extremely valid and should be taken into consideration very seriously, as it would reduce the footprint for an attack, I would check those devices from where the connection is originating for malware, just in case. There isn't a single reason I can think of for causing a server to try to establish an unsolicited SSH connection to another device other than malware. If you are seeing a lot of those it could be a brute force attack, and is extra worrying that is coming from inside your network.

    Regards,

    Giovani