SSH Chinese Bots
-
honeypots maybe? that these Chinese IP Addresses have these ports open, they have been blocked by fail2ban trying to hit my ssh port, find it interesting with the ports they have open.
nmap 112.85.42.89 Starting Nmap 7.80 ( https://nmap.org ) at 2022-01-12 19:43 GMT Nmap scan report for 112.85.42.89 Host is up (0.22s latency). Not shown: 993 closed ports PORT STATE SERVICE 135/tcp filtered msrpc 139/tcp filtered netbios-ssn 445/tcp filtered microsoft-ds 593/tcp filtered http-rpc-epmap 4444/tcp filtered krb524 5679/tcp open activesync 8008/tcp open http Nmap done: 1 IP address (1 host up) scanned in 11.40 seconds stuart@stu-desktop:~$ nmap 112.85.42.128 Starting Nmap 7.80 ( https://nmap.org ) at 2022-01-12 19:46 GMT Nmap scan report for 112.85.42.128 Host is up (0.21s latency). Not shown: 993 closed ports PORT STATE SERVICE 135/tcp filtered msrpc 139/tcp filtered netbios-ssn 445/tcp filtered microsoft-ds 593/tcp filtered http-rpc-epmap 4444/tcp filtered krb524 5679/tcp open activesync 8008/tcp open http
-
@stuartjordan said in SSH Chinese Bots:
honeypots maybe? that these Chinese IP Addresses have these ports open, they have been blocked by fail2ban trying to hit my ssh port, find it interesting with the ports they have open.
nmap 112.85.42.89 Starting Nmap 7.80 ( https://nmap.org ) at 2022-01-12 19:43 GMT Nmap scan report for 112.85.42.89 Host is up (0.22s latency). Not shown: 993 closed ports PORT STATE SERVICE 135/tcp filtered msrpc 139/tcp filtered netbios-ssn 445/tcp filtered microsoft-ds 593/tcp filtered http-rpc-epmap 4444/tcp filtered krb524 5679/tcp open activesync 8008/tcp open http Nmap done: 1 IP address (1 host up) scanned in 11.40 seconds stuart@stu-desktop:~$ nmap 112.85.42.128 Starting Nmap 7.80 ( https://nmap.org ) at 2022-01-12 19:46 GMT Nmap scan report for 112.85.42.128 Host is up (0.21s latency). Not shown: 993 closed ports PORT STATE SERVICE 135/tcp filtered msrpc 139/tcp filtered netbios-ssn 445/tcp filtered microsoft-ds 593/tcp filtered http-rpc-epmap 4444/tcp filtered krb524 5679/tcp open activesync 8008/tcp open http
I think there were some attacks if you could get a client to attempt to connect to a server (presumably on one of those ports) you could compromise the client.
-
@dashrender That's what I was thinking.
-
@stuartjordan said in SSH Chinese Bots:
@dashrender That's what I was thinking.
From a throwaway VM:
telnet <ip address> 8008 GET /
and see what comes back, lol.
-
@dafyre Connection closed by foreign host after a couple seconds lol