poor attack attemps?
Looking a log of one of my servers (private use) I see this:--------------------- SSHD Begin ------------------------
Did not get an ident string from these:
209.18.106.100
210.115.168.79
210.115.168.79
210.115.168.79
210.115.168.79
210.115.168.79
Failed logins from these:
backup/password from 200.109.96.251: 2 Time(s)
bin/password from 200.109.96.251: 1 Time(s)
computer/password from 200.109.96.251: 2 Time(s)
info/password from 200.109.96.251: 4 Time(s)
jack/password from 200.109.96.251: 4 Time(s)
master/password from 200.109.96.251: 2 Time(s)
oracle/password from 200.109.96.251: 3 Time(s)
root/password from 200.109.96.251: 14 Time(s)
slapme/password from 200.109.96.251: 3 Time(s)
student/password from 200.109.96.251: 1 Time(s)
webmaster/password from 200.109.96.251: 4 Time(s)
www/password from 200.109.96.251: 2 Time(s)
**Unmatched Entries**
Illegal user slapme from 200.109.96.251
Illegal user slapme from 200.109.96.251
Illegal user slapme from 200.109.96.251
Illegal user oracle from 200.109.96.251
Illegal user oracle from 200.109.96.251
Illegal user oracle from 200.109.96.251
Illegal user www from 200.109.96.251
Illegal user www from 200.109.96.251
Illegal user master from 200.109.96.251
Illegal user master from 200.109.96.251
Illegal user info from 200.109.96.251
Illegal user info from 200.109.96.251
Illegal user backup from 200.109.96.251
Illegal user backup from 200.109.96.251
Illegal user computer from 200.109.96.251
Illegal user computer from 200.109.96.251
Illegal user webmaster from 200.109.96.251
Illegal user webmaster from 200.109.96.251
Illegal user info from 200.109.96.251
Illegal user info from 200.109.96.251
Illegal user webmaster from 200.109.96.251
Illegal user webmaster from 200.109.96.251
Illegal user jack from 200.109.96.251
Illegal user jack from 200.109.96.251
Illegal user jack from 200.109.96.251
Illegal user jack from 200.109.96.251
Illegal user student from 200.109.96.251
---------------------- SSHD End -------------------------
Somebody really trying to have fun eh...
