Unknown ssh connections

Posted July 7, 2020 562 views

I just checked the ssh connections logs, because my public bandwidth is unusually high and found this:

tcp   ESTAB       0       1080                                            
tcp   FIN-WAIT-1  0       1                                              
tcp   ESTAB       0       36                                                        *MYIP*:61630
tcp   ESTAB       0       1080                                            
tcp   ESTAB       0       1080                                              

All of these except mine are chinese ips. I looked them up and they are all from the “Asia Pacific Network Information Centre”. Not sure what to do now with this information, but I don’t like it. Do I need to worry?

These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.

Submit an Answer
1 answer

Hi, @EMokro

You can block every IP address that makes unsuccessful ssh authentication as this is clearly not a legit traffic. You can install CSF (Config Server Firewall) and they will be automatically blocked and you can also set rules to block whole regions and countries.

You can also look into changing the ssh port and make only the pubkey authentication is enabled leaving the password authentication disabled in order to keep things safe. Also make sure everything on the droplet is updated and you’ve blocked/closed all the ports which are not used.

Brute force login attacks are one of the most common ways for a server to be compromised. This tutorial shows you how:

Hope that helps!


by Justin Ellingwood
by Brian Boucheron
SSH, or secure shell, is the most common way of administering remote Linux servers. Although the daemon allows password-based authentication, exposing a password-protected account to the network can open up your server to brute-force attacks. In this guide, we demonstrate how to configure your server with SSH keys, which is the recommended authentication method. These are much more difficult for attackers to work around, giving you a more secure login mechanism.