Well, I'd like to start off by thanking each and every one of you on this list
for the help setting up ipchains and making me aware of  portsentry and
logcheck as I have effortlessly survived my first potential attack. I woke up
this morning and headed upstate to the computer show not bothering to check my
email. When I returned I had an email from logcheck telling be that portsentry
had dumped a potential hacker into the bit bucket. I am sure most of you who
have had the pleasure of receiving such an email know the joy I felt at that
moment. Now I need some advice as to what I do next. Should I check any other
logs to make sure he didn't get in? Should I report the incident to his local
ISP. What steps do I take next?

Thank you all again for the help!
Steve


BTW: Here is what I got from logcheck:

Active System Attack Alerts
=-=-=-=-=-=-=-=-=-=-=-=-=-=
Jan 23 08:11:17 localhost portsentry[587]: attackalert: Connect from host: 
1Cust249.tnt20.chi5.da.uu.net/63.20.110.249 to UDP port: 31337
Jan 23 08:11:17 localhost portsentry[587]: attackalert: Host 63.20.110.249 has been 
blocked via wrappers with string: "ALL: 63.20.110.249"
Jan 23 08:11:17 localhost portsentry[587]: attackalert: Host 63.20.110.249 has been 
blocked via dropped route using command: "/sbin/ipchains -I input -s 63.20.110.249 -j 
DENY -l"

Security Violations
=-=-=-=-=-=-=-=-=-=
Jan 23 08:11:17 localhost portsentry[587]: attackalert: Connect from host: 
1Cust249.tnt20.chi5.da.uu.net/63.20.110.249 to UDP port: 31337
Jan 23 08:11:17 localhost portsentry[587]: attackalert: Host 63.20.110.249 has been 
blocked via wrappers with string: "ALL: 63.20.110.249"
Jan 23 08:11:17 localhost portsentry[587]: attackalert: Host 63.20.110.249 has been 
blocked via dropped route using command: "/sbin/ipchains -I input -s 63.20.110.249 -j 
DENY -l"

Unusual System Events
=-=-=-=-=-=-=-=-=-=-=
Jan 23 08:11:17 localhost portsentry[587]: attackalert: Connect from host: 
1Cust249.tnt20.chi5.da.uu.net/63.20.110.249 to UDP port: 31337
Jan 23 08:11:17 localhost portsentry[587]: attackalert: Host 63.20.110.249 has been 
blocked via wrappers with string: "ALL: 63.20.110.249"
Jan 23 08:11:17 localhost portsentry[587]: attackalert: Host 63.20.110.249 has been 
blocked via dropped route using command: "/sbin/ipchains -I input -s 63.20.110.249 -j 
DENY -l"


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to