• Introducing WebPros Cloud - a fully managed infrastructure platform purpose-built to simplify the deployment of WebPros products !  WebPros Cloud enables you to easily deliver WebPros solutions — without the complexity of managing the infrastructure.
    Join the pilot program today!
  • Support for BIND DNS has been removed from Plesk for Windows due to security and maintenance risks.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS.

SSH Last failed login: How to Improve security ??

Peter_R

Basic Pleskian
Hello i have a fresh Host Edition Installation and it was runing for about a week.
This is my second time i logged in to my server using SSH this week, and i noticed alarming message.

"Last failed login: Sun Jan 31 22:32:35 EST 2016 from xxx.xxx.142.71 on ssh:notty
There were 42278 failed login attempts since the last successful login."

Looks like there are a lot of hits on my server SSH port.

How can i increase the security to prevent hacking or someone trying to abuse my ssh connection?
Any advise?

I am newbie.
Thanks
 
Thank you for your reply
very helpful

also would be ok to change SSH port under Centos7 ? or not recommende?
i wonder if port change might affect any Plesk Functionality ?

Thanks
 
Hi,
would be ok to change SSH port under Centos7

I've changed the ssh-Port to an unusual port (in /etc/ssh/sshd_config). I closed port 22 in the firewall an opened the "unusual" port.
Additional I add a "special" user with a normal shell (/bin/bash) who is allowed to login. "root" is disabled to login via ssh on default.

fail2ban is a good choice too. ;-)

best regards
Holger
 
Thank you i used fail2ban and seems to be under control , ips get banned and if someone is persistent i am adding their ip to block list on my Zywall :)
 
Back
Top