找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
广告投放联系QQ68610888
查看: 1350|回复: 10

openwrt系统日志好多外地的ip是不是被攻击了?

[复制链接]
发表于 2022-9-17 10:46 | 显示全部楼层 |阅读模式
最近看各家大神出的固件包,大部分提到没有带后门,菊花一紧,然后在系统日志里发现这些信息,想知道是不是意味着我的openwrt正在被攻击吗?

Fri Sep 16 21:43:58 2022 kern.warn kernel: [165329.357146] ---[ end trace d67b0abcdfc5f0f9 ]---
Fri Sep 16 21:45:34 2022 auth.info sshd[30390]: Unable to negotiate with 139.162.117.219 port 36030: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Fri Sep 16 21:52:04 2022 auth.err sshd[31776]: error: kex_exchange_identification: Connection closed by remote host
Fri Sep 16 21:52:04 2022 auth.info sshd[31776]: Connection closed by 141.98.11.54 port 60284
Fri Sep 16 21:52:27 2022 auth.info sshd[31849]: Unable to negotiate with 141.98.11.54 port 52916: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 21:56:54 2022 auth.info sshd[444]: Unable to negotiate with 139.162.117.219 port 35152: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Fri Sep 16 22:04:54 2022 auth.info sshd[2990]: Unable to negotiate with 139.162.117.219 port 34226: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Fri Sep 16 22:25:38 2022 auth.info sshd[7436]: Unable to negotiate with 139.162.117.219 port 60636: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Fri Sep 16 22:31:05 2022 auth.info sshd[8570]: Unable to negotiate with 180.35.171.237 port 63450: no matching host key type found. Their offer: ssh-rsa,ssh-dss [preauth]
Fri Sep 16 22:33:29 2022 auth.info sshd[9125]: Unable to negotiate with 139.162.117.219 port 59726: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Fri Sep 16 22:34:40 2022 auth.info sshd[9401]: Unable to negotiate with 180.20.81.230 port 47669: no matching host key type found. Their offer: ssh-rsa,ssh-dss [preauth]
Fri Sep 16 22:34:42 2022 auth.info sshd[9383]: Unable to negotiate with 180.20.81.230 port 47675: no matching host key type found. Their offer: ssh-rsa,ssh-dss [preauth]
Fri Sep 16 22:34:43 2022 auth.info sshd[9421]: Unable to negotiate with 180.20.81.230 port 47691: no matching host key type found. Their offer: ssh-rsa,ssh-dss [preauth]
Fri Sep 16 22:41:11 2022 auth.info sshd[10831]: Unable to negotiate with 139.162.117.219 port 58814: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Fri Sep 16 22:49:30 2022 auth.info sshd[14254]: Unable to negotiate with 139.162.117.219 port 57886: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Fri Sep 16 22:49:48 2022 auth.err sshd[14392]: error: kex_exchange_identification: Connection closed by remote host
Fri Sep 16 22:49:48 2022 auth.info sshd[14392]: Connection closed by 141.98.11.54 port 52540
Fri Sep 16 22:49:53 2022 auth.info sshd[14423]: Unable to negotiate with 141.98.11.54 port 59608: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 22:57:32 2022 auth.info sshd[16037]: Unable to negotiate with 139.162.117.219 port 56980: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Fri Sep 16 23:05:57 2022 auth.info sshd[17717]: Unable to negotiate with 139.162.117.219 port 56092: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Fri Sep 16 23:13:26 2022 auth.info sshd[19429]: Unable to negotiate with 139.162.117.219 port 55164: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Fri Sep 16 23:13:30 2022 auth.err sshd[19454]: error: kex_exchange_identification: Connection closed by remote host
Fri Sep 16 23:13:30 2022 auth.info sshd[19454]: Connection closed by 141.98.11.54 port 39492
Fri Sep 16 23:13:39 2022 auth.info sshd[19494]: Unable to negotiate with 141.98.11.54 port 41642: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 23:20:55 2022 auth.info sshd[21029]: Unable to negotiate with 139.162.117.219 port 54280: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Fri Sep 16 23:24:20 2022 auth.err sshd[21737]: error: kex_exchange_identification: Connection closed by remote host
Fri Sep 16 23:24:20 2022 auth.info sshd[21737]: Connection closed by 141.98.10.90 port 45240
Fri Sep 16 23:24:47 2022 auth.info sshd[21870]: Unable to negotiate with 141.98.10.90 port 37908: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 23:28:35 2022 auth.info sshd[22704]: Unable to negotiate with 139.162.117.219 port 53382: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Fri Sep 16 23:35:25 2022 auth.err sshd[24117]: error: kex_exchange_identification: Connection closed by remote host
Fri Sep 16 23:35:25 2022 auth.info sshd[24117]: Connection closed by 179.43.156.143 port 60114
Fri Sep 16 23:35:36 2022 auth.info sshd[24160]: Unable to negotiate with 139.162.117.219 port 52480: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Fri Sep 16 23:35:50 2022 auth.info sshd[24261]: Unable to negotiate with 179.43.156.143 port 33816: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 23:36:23 2022 auth.info sshd[24377]: Unable to negotiate with 179.43.156.143 port 58386: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 23:36:56 2022 auth.info sshd[24524]: Unable to negotiate with 179.43.156.143 port 54754: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 23:37:29 2022 auth.info sshd[24623]: Unable to negotiate with 179.43.156.143 port 51118: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 23:38:00 2022 auth.info sshd[24768]: Unable to negotiate with 179.43.156.143 port 47474: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 23:38:32 2022 auth.info sshd[24882]: Unable to negotiate with 179.43.156.143 port 43824: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 23:39:04 2022 auth.info sshd[25029]: Unable to negotiate with 179.43.156.143 port 40174: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 23:39:38 2022 auth.info sshd[25130]: Unable to negotiate with 179.43.156.143 port 36552: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 23:40:12 2022 auth.info sshd[25304]: Unable to negotiate with 179.43.156.143 port 32870: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 23:40:45 2022 auth.info sshd[25405]: Unable to negotiate with 179.43.156.143 port 57468: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 23:41:18 2022 auth.info sshd[25565]: Unable to negotiate with 179.43.156.143 port 53860: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 23:41:52 2022 auth.info sshd[25720]: Unable to negotiate with 179.43.156.143 port 50210: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 23:42:26 2022 auth.info sshd[25839]: Unable to negotiate with 179.43.156.143 port 46570: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 23:42:39 2022 auth.info sshd[25882]: Unable to negotiate with 139.162.117.219 port 51572: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Fri Sep 16 23:42:59 2022 auth.info sshd[26004]: Unable to negotiate with 179.43.156.143 port 42926: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 23:43:33 2022 auth.info sshd[26105]: Unable to negotiate with 179.43.156.143 port 39282: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 23:49:42 2022 auth.info sshd[27499]: Unable to negotiate with 139.162.117.219 port 50692: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Fri Sep 16 23:51:30 2022 auth.err sshd[27911]: error: kex_exchange_identification: Connection closed by remote host
Fri Sep 16 23:51:30 2022 auth.info sshd[27911]: Connection closed by 58.72.18.130 port 19108
Fri Sep 16 23:53:08 2022 kern.info kernel: [173078.025828] sh (6024): drop_caches: 3
Fri Sep 16 23:53:09 2022 auth.err sshd[6035]: error: kex_exchange_identification: Connection closed by remote host
Fri Sep 16 23:53:09 2022 auth.info sshd[6035]: Connection closed by 121.5.54.92 port 36256
Fri Sep 16 23:53:10 2022 auth.info sshd[6037]: Invalid user testuser from 121.5.54.92 port 38958
Fri Sep 16 23:53:10 2022 auth.err sshd[6037]: error: Could not get shadow information for NOUSER
Fri Sep 16 23:53:10 2022 auth.info sshd[6037]: Failed password for invalid user testuser from 121.5.54.92 port 38958 ssh2
Fri Sep 16 23:53:10 2022 auth.info sshd[6043]: Failed password for root from 121.5.54.92 port 38924 ssh2
Fri Sep 16 23:53:10 2022 auth.info sshd[6037]: Connection closed by invalid user testuser 121.5.54.92 port 38958 [preauth]
Fri Sep 16 23:53:10 2022 auth.info sshd[6039]: Failed password for root from 121.5.54.92 port 38898 ssh2
Fri Sep 16 23:53:10 2022 auth.info sshd[6043]: Connection closed by authenticating user root 121.5.54.92 port 38924 [preauth]
Fri Sep 16 23:53:10 2022 auth.info sshd[6041]: Invalid user admin from 121.5.54.92 port 38964
Fri Sep 16 23:53:10 2022 auth.info sshd[6039]: Connection closed by authenticating user root 121.5.54.92 port 38898 [preauth]
Fri Sep 16 23:53:10 2022 auth.info sshd[6040]: Invalid user rustserver from 121.5.54.92 port 38982
Fri Sep 16 23:53:10 2022 auth.info sshd[6038]: Invalid user mysql from 121.5.54.92 port 38974
Fri Sep 16 23:53:10 2022 auth.info sshd[6042]: Invalid user postgres from 121.5.54.92 port 38970
Fri Sep 16 23:53:10 2022 auth.err sshd[6041]: error: Could not get shadow information for NOUSER
Fri Sep 16 23:53:10 2022 auth.info sshd[6041]: Failed password for invalid user admin from 121.5.54.92 port 38964 ssh2
Fri Sep 16 23:53:10 2022 auth.info sshd[6036]: Failed password for root from 121.5.54.92 port 38948 ssh2
Fri Sep 16 23:53:10 2022 auth.err sshd[6040]: error: Could not get shadow information for NOUSER
Fri Sep 16 23:53:10 2022 auth.info sshd[6040]: Failed password for invalid user rustserver from 121.5.54.92 port 38982 ssh2
Fri Sep 16 23:53:10 2022 auth.err sshd[6038]: error: Could not get shadow information for NOUSER
Fri Sep 16 23:53:10 2022 auth.info sshd[6038]: Failed password for invalid user mysql from 121.5.54.92 port 38974 ssh2
Fri Sep 16 23:53:10 2022 auth.err sshd[6042]: error: Could not get shadow information for NOUSER
Fri Sep 16 23:53:10 2022 auth.info sshd[6042]: Failed password for invalid user postgres from 121.5.54.92 port 38970 ssh2
Fri Sep 16 23:53:10 2022 auth.info sshd[6041]: Connection closed by invalid user admin 121.5.54.92 port 38964 [preauth]
Fri Sep 16 23:53:10 2022 auth.info sshd[6036]: Connection closed by authenticating user root 121.5.54.92 port 38948 [preauth]
Fri Sep 16 23:53:10 2022 auth.info sshd[6038]: Connection closed by invalid user mysql 121.5.54.92 port 38974 [preauth]
Fri Sep 16 23:53:10 2022 auth.info sshd[6040]: Connection closed by invalid user rustserver 121.5.54.92 port 38982 [preauth]
Fri Sep 16 23:53:10 2022 auth.info sshd[6042]: Connection closed by invalid user postgres 121.5.54.92 port 38970 [preauth]
Fri Sep 16 23:53:10 2022 auth.info sshd[6262]: Invalid user testuser from 121.5.54.92 port 38956
Fri Sep 16 23:53:10 2022 auth.err sshd[6262]: error: Could not get shadow information for NOUSER
Fri Sep 16 23:53:10 2022 auth.info sshd[6262]: Failed password for invalid user testuser from 121.5.54.92 port 38956 ssh2
Fri Sep 16 23:53:10 2022 auth.info sshd[6262]: Connection closed by invalid user testuser 121.5.54.92 port 38956 [preauth]
Fri Sep 16 23:53:12 2022 auth.info sshd[6550]: Invalid user ftpadmin from 121.5.54.92 port 39004
Fri Sep 16 23:53:12 2022 auth.info sshd[6549]: Invalid user ts3 from 121.5.54.92 port 38942
Fri Sep 16 23:53:12 2022 auth.info sshd[6551]: Invalid user oracle from 121.5.54.92 port 38918
Fri Sep 16 23:53:12 2022 auth.info sshd[6556]: Invalid user devops from 121.5.54.92 port 38928
Fri Sep 16 23:53:12 2022 auth.err sshd[6550]: error: Could not get shadow information for NOUSER
Fri Sep 16 23:53:12 2022 auth.info sshd[6550]: Failed password for invalid user ftpadmin from 121.5.54.92 port 39004 ssh2
Fri Sep 16 23:53:12 2022 auth.err sshd[6551]: error: Could not get shadow information for NOUSER
Fri Sep 16 23:53:12 2022 auth.info sshd[6551]: Failed password for invalid user oracle from 121.5.54.92 port 38918 ssh2
Fri Sep 16 23:53:12 2022 auth.err sshd[6549]: error: Could not get shadow information for NOUSER
Fri Sep 16 23:53:12 2022 auth.info sshd[6548]: Failed password for root from 121.5.54.92 port 38996 ssh2
Fri Sep 16 23:53:12 2022 auth.info sshd[6549]: Failed password for invalid user ts3 from 121.5.54.92 port 38942 ssh2
Fri Sep 16 23:53:12 2022 auth.err sshd[6556]: error: Could not get shadow information for NOUSER
Fri Sep 16 23:53:12 2022 auth.info sshd[6556]: Failed password for invalid user devops from 121.5.54.92 port 38928 ssh2
Fri Sep 16 23:53:12 2022 auth.info sshd[6550]: Connection closed by invalid user ftpadmin 121.5.54.92 port 39004 [preauth]
Fri Sep 16 23:53:12 2022 auth.info sshd[6551]: Connection closed by invalid user oracle 121.5.54.92 port 38918 [preauth]
Fri Sep 16 23:53:12 2022 auth.info sshd[6548]: Connection closed by authenticating user root 121.5.54.92 port 38996 [preauth]
Fri Sep 16 23:53:12 2022 auth.info sshd[6549]: Connection closed by invalid user ts3 121.5.54.92 port 38942 [preauth]
Fri Sep 16 23:53:12 2022 auth.info sshd[6556]: Connection closed by invalid user devops 121.5.54.92 port 38928 [preauth]
Fri Sep 16 23:53:16 2022 auth.info sshd[7145]: Invalid user test from 121.5.54.92 port 38978
Fri Sep 16 23:53:16 2022 auth.info sshd[7144]: Invalid user oracle from 121.5.54.92 port 38904
Fri Sep 16 23:53:16 2022 auth.err sshd[7145]: error: Could not get shadow information for NOUSER
Fri Sep 16 23:53:16 2022 auth.info sshd[7145]: Failed password for invalid user test from 121.5.54.92 port 38978 ssh2
Fri Sep 16 23:53:16 2022 auth.err sshd[7144]: error: Could not get shadow information for NOUSER
Fri Sep 16 23:53:16 2022 auth.info sshd[7144]: Failed password for invalid user oracle from 121.5.54.92 port 38904 ssh2
Fri Sep 16 23:53:16 2022 auth.info sshd[7145]: Connection closed by invalid user test 121.5.54.92 port 38978 [preauth]
Fri Sep 16 23:53:16 2022 auth.info sshd[7144]: Connection closed by invalid user oracle 121.5.54.92 port 38904 [preauth]
Fri Sep 16 23:53:24 2022 auth.info sshd[8241]: Failed password for root from 121.5.54.92 port 38916 ssh2
Fri Sep 16 23:53:24 2022 auth.info sshd[8241]: Connection closed by authenticating user root 121.5.54.92 port 38916 [preauth]
Fri Sep 16 23:53:24 2022 auth.info sshd[8242]: Failed password for root from 121.5.54.92 port 38900 ssh2
Fri Sep 16 23:53:24 2022 auth.info sshd[8243]: Failed password for root from 121.5.54.92 port 38892 ssh2
Fri Sep 16 23:53:24 2022 auth.info sshd[8246]: Failed password for root from 121.5.54.92 port 38994 ssh2
Fri Sep 16 23:53:24 2022 auth.info sshd[8242]: Connection closed by authenticating user root 121.5.54.92 port 38900 [preauth]
Fri Sep 16 23:53:24 2022 auth.info sshd[8243]: Connection closed by authenticating user root 121.5.54.92 port 38892 [preauth]
Fri Sep 16 23:53:24 2022 auth.info sshd[8246]: Connection closed by authenticating user root 121.5.54.92 port 38994 [preauth]
Fri Sep 16 23:53:40 2022 auth.info sshd[10401]: Invalid user user from 121.5.54.92 port 39008
Fri Sep 16 23:53:40 2022 auth.err sshd[10401]: error: Could not get shadow information for NOUSER
Fri Sep 16 23:53:40 2022 auth.info sshd[10401]: Failed password for invalid user user from 121.5.54.92 port 39008 ssh2
Fri Sep 16 23:53:40 2022 auth.info sshd[10405]: Invalid user postgres from 121.5.54.92 port 38988
Fri Sep 16 23:53:40 2022 auth.info sshd[10401]: Connection closed by invalid user user 121.5.54.92 port 39008 [preauth]
Fri Sep 16 23:53:40 2022 auth.info sshd[10407]: Invalid user devops from 121.5.54.92 port 38972
Fri Sep 16 23:53:40 2022 auth.info sshd[10402]: Failed password for root from 121.5.54.92 port 39002 ssh2
Fri Sep 16 23:53:40 2022 auth.info sshd[10406]: Invalid user steam from 121.5.54.92 port 38990
Fri Sep 16 23:53:40 2022 auth.err sshd[10405]: error: Could not get shadow information for NOUSER
Fri Sep 16 23:53:40 2022 auth.info sshd[10405]: Failed password for invalid user postgres from 121.5.54.92 port 38988 ssh2
Fri Sep 16 23:53:40 2022 auth.info sshd[10402]: Connection closed by authenticating user root 121.5.54.92 port 39002 [preauth]
Fri Sep 16 23:53:40 2022 auth.err sshd[10407]: error: Could not get shadow information for NOUSER
Fri Sep 16 23:53:40 2022 auth.err sshd[10406]: error: Could not get shadow information for NOUSER
Fri Sep 16 23:53:40 2022 auth.info sshd[10407]: Failed password for invalid user devops from 121.5.54.92 port 38972 ssh2
Fri Sep 16 23:53:40 2022 auth.info sshd[10406]: Failed password for invalid user steam from 121.5.54.92 port 38990 ssh2
Fri Sep 16 23:53:40 2022 auth.info sshd[10405]: Connection closed by invalid user postgres 121.5.54.92 port 38988 [preauth]
Fri Sep 16 23:53:40 2022 auth.info sshd[10406]: Connection closed by invalid user steam 121.5.54.92 port 38990 [preauth]
Fri Sep 16 23:53:40 2022 auth.info sshd[10407]: Connection closed by invalid user devops 121.5.54.92 port 38972 [preauth]
Fri Sep 16 23:57:51 2022 auth.err sshd[12167]: error: kex_exchange_identification: Connection closed by remote host
Fri Sep 16 23:57:51 2022 auth.info sshd[12167]: Connection closed by 141.98.11.54 port 52978
Fri Sep 16 23:57:59 2022 auth.info sshd[12204]: Unable to negotiate with 141.98.11.54 port 48554: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Fri Sep 16 23:58:10 2022 auth.info sshd[12301]: Unable to negotiate with 139.162.117.219 port 49800: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Sat Sep 17 00:05:32 2022 auth.info sshd[13893]: Unable to negotiate with 139.162.117.219 port 48886: no matching host key type found. Their offer: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Sat Sep 17 00:07:43 2022 daemon.err nlbwmon[9810]: Netlink receive failure: Out of memory

只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
发表于 2022-9-17 11:01 | 显示全部楼层
看我的帖子,关闭SSH登录改密码

点评

按你的教程,参照别人的分享, ssh端口没改,只是只是把监听的ip改成本地路由的了,让后重启,在系统日志就没有那些乱七八糟的外地ip了。 不看这样搞是不是更好点。 #AddressFamily any ListenAddress 192.168.2  详情 回复 发表于 2022-9-17 12:06
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

发表于 2022-9-17 11:09 | 显示全部楼层
关闭ssh服务或者在防火墙里设置丢弃22端口数据

点评

谢谢知道,  详情 回复 发表于 2022-9-17 12:07
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

发表于 2022-9-17 11:16 | 显示全部楼层
本帖最后由 wulishui 于 2022-9-17 11:17 编辑

他们不是不带,而是他们不管或者不懂,ssh默认是开wan口菊花的。这是最莫名其妙的配置,需要这个菊花的人不到不需要这个菊花的人1%,造成99%的人因1%的人受害
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

发表于 2022-9-17 11:27 | 显示全部楼层
这类的固件还是不要放在公网上,用内网穿透访问好一些
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

 楼主| 发表于 2022-9-17 12:06 | 显示全部楼层
bobogdst 发表于 2022-9-17 11:01
看我的帖子,关闭SSH登录改密码

按你的教程,参照别人的分享,
ssh端口没改,只是只是把监听的ip改成本地路由的了,让后重启,在系统日志就没有那些乱七八糟的外地ip了。
不看这样搞是不是更好点。
#AddressFamily any
ListenAddress 192.168.2.1
#ListenAddress ::
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

 楼主| 发表于 2022-9-17 12:07 | 显示全部楼层
NghDYq 发表于 2022-9-17 11:09
关闭ssh服务或者在防火墙里设置丢弃22端口数据

谢谢知道,
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

发表于 2022-9-17 15:39 | 显示全部楼层
所以撸主你用的哪家固件 默认开放ssh的WAN 22端口root密码访问?
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

 楼主| 发表于 2022-9-17 16:06 | 显示全部楼层
avin4 发表于 2022-9-17 15:39
所以撸主你用的哪家固件 默认开放ssh的WAN 22端口root密码访问?

应该没有连接成功吧,我看都是没有什么key被关闭的,另外登陆这个openwrt后台能有做什么操作
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

 楼主| 发表于 2022-9-17 16:06 | 显示全部楼层
avin4 发表于 2022-9-17 15:39
所以撸主你用的哪家固件 默认开放ssh的WAN 22端口root密码访问?

应该没有连接成功吧,我看都是没有什么key被关闭的,另外登陆这个openwrt后台能有做什么操作
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

发表于 2022-9-18 06:05 | 显示全部楼层
缺省的路由配置,ssh的wan口是block的,这是最基本的安全常识,也是标准的openwrt的配置
如果被打开,怀疑是有意而为之一点不为过
只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

欢迎大家光临恩山无线论坛上一条 /1 下一条

有疑问请添加管理员QQ86788181|手机版|小黑屋|Archiver|恩山无线论坛(常州市恩山计算机开发有限公司版权所有) ( 苏ICP备05084872号 )

GMT+8, 2024-9-23 20:24

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

| 江苏省互联网有害信息举报中心 举报信箱:js12377 | @jischina.com.cn 举报电话:025-88802724 本站不良内容举报信箱:68610888@qq.com

快速回复 返回顶部 返回列表