I have been noticing an increasing amount of &ftp port scans& (Don't know if that is the correct term, but it seems to explain it best). Anyways, in /var/log/messages I see the following:
May 23 12:40:08 bn1 proftpd[20025]: x.x.x.32 (kbl-tnz6815.zeelandnet.nl[62.
238.58.211]) - FTP session opened.
May 23 12:40:08 bn1 proftpd[20028]: x.x.x.109 (kbl-tnz6815.zeelandnet.nl[62
.238.58.211]) - FTP session opened.
May 23 12:40:08 bn1 proftpd[20031]: x.x.x.108 (kbl-tnz6815.zeelandnet.nl[62
.238.58.211]) - FTP session opened.
May 23 12:40:08 bn1 proftpd[20033]: x.x.x.73 (kbl-tnz6815.zeelandnet.nl[62.
238.58.211]) - FTP session opened.
May 23 12:40:08 bn1 proftpd[20032]: x.x.x.106 (kbl-tnz6815.zeelandnet.nl[62
.238.58.211]) - FTP session opened.
May 23 12:40:08 bn1 proftpd[19988]: x.x.x.10 (kbl-tnz6815.zeelandnet.nl[62.
238.58.211]) - FTP session closed.
May 23 12:40:08 bn1 proftpd[20034]: x.x.x.16 (kbl-tnz6815.zeelandnet.nl[62.
238.58.211]) - FTP session opened.
May 23 12:40:11 bn1 proftpd[20035]: x.x.x.20 (kbl-tnz6815.zeelandnet.nl[62.
238.58.211]) - FTP session opened.
May 23 12:40:14 bn1 proftpd[19979]: x.x.x.59 (kbl-tnz6815.zeelandnet.nl[62.
238.58.211]) - FTP session closed.
May 23 12:40:15 bn1 proftpd[19982]: x.x.x.54 (kbl-tnz6815.zeelandnet.nl[62.
238.58.211]) - FTP session closed.
Whenever this happens, it causes the load to increase dramatically, from about 1.4 to 30.0 or so.
Anyone know how I can stop these scans? I do have portsentry running which I would assume would detect and drop these scans, but this does not seem to be the case. Also, from the looks of the log file, these ftp sessions are being opened successfully? This cannot be good as I would assume that this would be a security vulnerability.
This server is running Red Hat 7.1 with Cpanel / whm. Please help me fix this!
May 23 12:40:08 bn1 proftpd[20025]: x.x.x.32 (kbl-tnz6815.zeelandnet.nl[62.
238.58.211]) - FTP session opened.
May 23 12:40:08 bn1 proftpd[20028]: x.x.x.109 (kbl-tnz6815.zeelandnet.nl[62
.238.58.211]) - FTP session opened.
May 23 12:40:08 bn1 proftpd[20031]: x.x.x.108 (kbl-tnz6815.zeelandnet.nl[62
.238.58.211]) - FTP session opened.
May 23 12:40:08 bn1 proftpd[20033]: x.x.x.73 (kbl-tnz6815.zeelandnet.nl[62.
238.58.211]) - FTP session opened.
May 23 12:40:08 bn1 proftpd[20032]: x.x.x.106 (kbl-tnz6815.zeelandnet.nl[62
.238.58.211]) - FTP session opened.
May 23 12:40:08 bn1 proftpd[19988]: x.x.x.10 (kbl-tnz6815.zeelandnet.nl[62.
238.58.211]) - FTP session closed.
May 23 12:40:08 bn1 proftpd[20034]: x.x.x.16 (kbl-tnz6815.zeelandnet.nl[62.
238.58.211]) - FTP session opened.
May 23 12:40:11 bn1 proftpd[20035]: x.x.x.20 (kbl-tnz6815.zeelandnet.nl[62.
238.58.211]) - FTP session opened.
May 23 12:40:14 bn1 proftpd[19979]: x.x.x.59 (kbl-tnz6815.zeelandnet.nl[62.
238.58.211]) - FTP session closed.
May 23 12:40:15 bn1 proftpd[19982]: x.x.x.54 (kbl-tnz6815.zeelandnet.nl[62.
238.58.211]) - FTP session closed.
Whenever this happens, it causes the load to increase dramatically, from about 1.4 to 30.0 or so.
Anyone know how I can stop these scans? I do have portsentry running which I would assume would detect and drop these scans, but this does not seem to be the case. Also, from the looks of the log file, these ftp sessions are being opened successfully? This cannot be good as I would assume that this would be a security vulnerability.
This server is running Red Hat 7.1 with Cpanel / whm. Please help me fix this!