Question

Unknown ssh connections

I just checked the ssh connections logs, because my public bandwidth is unusually high and found this:

tcp   ESTAB       0       1080                         68.183.77.132:ssh                                       61.177.172.158:49833
tcp   FIN-WAIT-1  0       1                            68.183.77.132:ssh                                      222.186.180.223:22882
tcp   ESTAB       0       36                           68.183.77.132:ssh                                       *MYIP*:61630
tcp   ESTAB       0       1080                         68.183.77.132:ssh                                       61.177.172.158:21058
tcp   ESTAB       0       1080                         68.183.77.132:ssh                                         218.92.0.248:47166

All of these except mine are chinese ips. I looked them up and they are all from the “Asia Pacific Network Information Centre”. Not sure what to do now with this information, but I don’t like it. Do I need to worry?

Subscribe
Share

Submit an answer
You can type!ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!

These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.

Hi, @EMokro

You can block every IP address that makes unsuccessful ssh authentication as this is clearly not a legit traffic. You can install CSF (Config Server Firewall) and they will be automatically blocked and you can also set rules to block whole regions and countries.

You can also look into changing the ssh port and make only the pubkey authentication is enabled leaving the password authentication disabled in order to keep things safe. Also make sure everything on the droplet is updated and you’ve blocked/closed all the ports which are not used.

Brute force login attacks are one of the most common ways for a server to be compromised. This tutorial shows you how:

  • [How To Configure SSH Key-Based Authentication on a Linux Server](https://www.digitalocean.com/community/tutorials/how-to-configure-ssh-key-based-authentication-on-a-linux-server)
    

Hope that helps!

Regards, Alex