Greetings,
As is expected, if I log dropped connections, I see lots of them.
Any suggestions for a simple, free SIEM/log analyzer? Ideally something that would summarize thing and show, for example, "200 SSH attempts from IP address, a.b.c.d in China... or something like that.
Thanks,
John
As is expected, if I log dropped connections, I see lots of them.
Any suggestions for a simple, free SIEM/log analyzer? Ideally something that would summarize thing and show, for example, "200 SSH attempts from IP address, a.b.c.d in China... or something like that.
Thanks,
John
Code:
Feb 23 15:02:00 kernel: DROP IN=eth0 OUT= MAC=1c:87:2c:4a:20:d0:2c:0b:e9:15:9c:22:08:00 SRC=71.6.216.53 DST=71.195.11.24 LEN=40 TOS=0x00 PREC=0x20 TTL=242 ID=54321 PROTO=TCP SPT=16992 DPT=16992 SEQ=1202533037 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0
Feb 23 15:02:07 kernel: DROP IN=eth0 OUT= MAC=1c:87:2c:4a:20:d0:2c:0b:e9:15:9c:22:08:00 SRC=50.7.78.226 DST=71.195.11.24 LEN=44 TOS=0x00 PREC=0x20 TTL=55 ID=22903 DF PROTO=UDP SPT=39435 DPT=27874 LEN=24
Feb 23 15:02:07 kernel: DROP IN=eth0 OUT= MAC=1c:87:2c:4a:20:d0:2c:0b:e9:15:9c:22:08:00 SRC=198.255.32.138 DST=71.195.11.24 LEN=44 TOS=0x00 PREC=0x20 TTL=56 ID=64422 DF PROTO=UDP SPT=54828 DPT=27874 LEN=24
Feb 23 15:02:07 kernel: DROP IN=eth0 OUT= MAC=1c:87:2c:4a:20:d0:2c:0b:e9:15:9c:22:08:00 SRC=198.255.30.194 DST=71.195.11.24 LEN=44 TOS=0x00 PREC=0x20 TTL=56 ID=5828 DF PROTO=UDP SPT=38984 DPT=27874 LEN=24