TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

We scanned the Internet for port 22

126 pointsby yammesickaover 11 years ago

13 comments

noir_lordover 11 years ago
&gt; However, please consider adding our scanner (71.6.151.167) to your &quot;whitelist&quot;. We are well-known cyber-sec researchers, we aren&#x27;t trying anything nefarious or evil, and we are being as transparent as possible about our scans.<p>Sure and while we are at it I&#x27;ll fetch the lube.<p>I don&#x27;t complain about port 22 connections because none of my machines run anything on port 22 (I move SSH to a random port mostly to deter whatever is coming out of China this week).<p>Even if you do find the port you still have to get around the ssh key&#x27;s (so unless you are the NSA (j&#x2F;k)), you could try an exploit against ssh but as it doesn&#x27;t report its version good look with that and do try to avoid triggering fail2ban.<p>I&#x27;m not a systems administrator (I guess I&#x27;d be DevOps) but I know enough to know I don&#x27;t know enough to disregard best practice.
评论 #6383943 未加载
评论 #6383935 未加载
rsyncover 11 years ago
People. Port knocking. Seriously. There are very few things that have come and gone in the almost 20 years that I have been securing systems and dealing with attacks, but port knocking is a substantive, Truly Good Thing.<p>Works for a lot of other ports too, but ssh is the obvious one.
评论 #6384313 未加载
评论 #6384457 未加载
评论 #6384232 未加载
评论 #6384304 未加载
评论 #6384098 未加载
zippergzover 11 years ago
Why do people think it&#x27;s worthwhile to file abuse complaints about port 22 connections? If I wanted to file a complaint about every random connection to port 22 on one of my machines, it would be a full time job...
评论 #6384226 未加载
评论 #6383982 未加载
评论 #6383777 未加载
pdenyaover 11 years ago
&gt; Yesterday (Sept. 12) we scanned the entire Internet for port 22<p>&gt; … result of 1,730,887 systems on the Internet … (Note: this is actually only 60% of the Internet<p>So there are only 2,884,811-ish machines on the internet?
评论 #6384148 未加载
matt__roseover 11 years ago
OpenSSH 4.3 is likely the most popular because it is the version that comes with (redhat|centos|scientific|oracle) linux 5. It&#x27;s still widely in use. 4.3 had a lot of bugs, but redhat has been backporting fixes to it since it came out.
评论 #6385121 未加载
virtualwhysover 11 years ago
I used to run SSH over some port != 22, does the trick to some degree.<p>After I picked up a Cisco ASA, went back to standard port 22 but only allow access for connected VPN users.<p>Of course if the ASA goes down, so does the entire network, yelp. SmartNET contract&#x2F;warranty comes in handy, and the data center having backup ASAs on site for quick swap is pretty useful as well.
评论 #6385106 未加载
评论 #6384924 未加载
telephonetempover 11 years ago
I run a VPS that only is only accessible over IPv6. I wonder if they&#x27;ll ever scan it. Is there a way to narrow down the whole IPv6 search space to the most populated subranges?
评论 #6385116 未加载
sebcatover 11 years ago
I&#x27;m on a phone with shitty wifi atm so looking at the code would be hard to say the least. However, I am curious, how do you deal with packet loss?<p>The reason I&#x27;m asking is because, most people who claim to &quot;scan the Internet&quot; assume that the network is reliable. And they don&#x27;t follow up on potential false negatives. If you scan the IPv4 address-space sequentially while only limiting bandwidth or time, rest assured that packets will be dropped.
andrewcookeover 11 years ago
if you&#x27;re curious about your server keys:<p><pre><code> cd &#x2F;etc&#x2F;ssh for pub in `ls -1 *.pub`; do ssh-keygen -l -f $pub; done </code></pre> [edit: sorry; thought no-one had replied. earlier i asked what i should worry about in ssh config. edit2: actually, i am using fail2ban.]
评论 #6383962 未加载
评论 #6383767 未加载
swalshover 11 years ago
Reading through the source code, there&#x27;s actually a reasonably well used goto (<a href="https://github.com/robertdavidgraham/masscan/blob/master/src/main-throttle.c" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;robertdavidgraham&#x2F;masscan&#x2F;blob&#x2F;master&#x2F;src...</a>)
mabhatterover 11 years ago
If they are only hitting a port 22 a few times, who&#x27;s wasting the ISP&#x27;s time with abuse requests... I suppose its probably those guys with Class-A blocks and too much time on their hands.
chatmanover 11 years ago
What good does it bring anyway to repeatedly scan for the port 22? Doing it once a month makes sense, but doing it daily doesn&#x27;t.
评论 #6383961 未加载
rorrr2over 11 years ago
Maybe you should randomize the order of IPs you scan, so you don&#x27;t hit the same network at 100K requests&#x2F;sec.
评论 #6385508 未加载