Custom query (799 matches)

Filters
 
or
 
  
 
Columns

Show under each result:


Results (58 - 60 of 799)

Ticket Resolution Summary Owner Reporter
#1138 pending Network is flaky in Tyrelka panda@… mellon@…
Description
I keep associating and disassociating with the AP.   Happens about every 30
seconds.   While connected, seems to be working okay.   I'm using
ietf-nat64.
#1137 not broken port scan report on "ietf" SSID LAN < default > dave@…
Description
Hi NOC folks,

In case you care, I received the attached notification while on SSID
"ietf" with my address being the following:

$ host 31.133.140.203
203.140.133.31.in-addr.arpa domain name pointer dhcp-8ccb.meeting.ietf.org.

Thanks,
Dave

-- 
dave@plonka.us  http://www.cs.wisc.edu/~plonka/

Screen Shot 2017-07-19 at 12.31.24 PM.png

#1136 fixed Abuse from 31.130.230.71 con@… anonymous
Description
Dear Sir/Madam,

We have detected abuse from the IP address ( 31.130.230.71 ), which according to a whois lookup is on your network. We would appreciate if you would investigate and take action as appropriate. Any feedback is welcome but not mandatory.

Log lines are given below, but please ask if you require any further information.

(If you are not the correct person to contact about this please accept our apologies - your e-mail address was extracted from the whois record by an automated process. This mail was generated by Fail2Ban.)

IP of the attacker:  31.130.230.71 

You can contact us by using: abuse-reply@keyweb.de

Addresses to send to:
tickets@meeting.ietf.org

==================== Excerpt from log for 31.130.230.71 ====================
Note: Local timezone is +0200 (CEST)
Jul 19 11:56:33 shared05 sshd[28288]: Invalid user pi from 31.130.230.71
Jul 19 11:56:33 shared05 sshd[28289]: Invalid user pi from 31.130.230.71
Jul 19 11:56:33 shared05 sshd[28289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.130.230.71 
Jul 19 11:56:33 shared05 sshd[28288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.130.230.71 
Jul 19 11:56:35 shared05 sshd[28289]: Failed password for invalid user pi from 31.130.230.71 port 34144 ssh2
Jul 19 11:56:35 shared05 sshd[28289]: Connection closed by 31.130.230.71 [preauth]
Jul 19 11:56:35 shared05 sshd[28288]: Failed password for invalid user pi from 31.130.230.71 port 34142 ssh2
Jul 19 11:56:35 shared05 sshd[28288]: Connection closed by 31.130.230.71 [preauth]
Note: See TracQuery for help on using queries.