| 1 | # Invalid SSH Login Attempts |
|---|
| 2 | watchfor /(: [iI]nvalid [uU]ser )(.*)( from )(.*)$/ |
|---|
| 3 | threshold track_by=$4, type=limit, count=10, seconds=600 |
|---|
| 4 | mail=monitoring,subject=SSH dictionary attack |
|---|
| 5 | |
|---|
| 6 | watchfor /(: [fF]ailed password for )(.*)( from )(.*)( port )(.*)$/ |
|---|
| 7 | threshold track_by=$4, type=limit, count=10, seconds=600 |
|---|
| 8 | mail=monitoring,subject=SSH brute force attempt |
|---|
| 9 | |
|---|
| 10 | # Cisco config |
|---|
| 11 | watchfor /SYS-5-CONFIG_I: Configured from (.*) by (.*) on (.*) (\(.*\))$/ |
|---|
| 12 | mail=monitoring,subject=Router config by $2 from $4 |
|---|
| 13 | |
|---|
| 14 | # Denied AXFRs |
|---|
| 15 | watchfor /client ([0-9.:]+)\D\d+: zone transfer '(.*)\/.XFR\/IN' denied$/ |
|---|
| 16 | mail=monitoring,subject=Denied AXFR for zone '$2' from $1 |
|---|
| 17 | throttle threshold=3,delay=0:1:0,key=$1 |
|---|
| 18 | threshold track_by=$1, type=limit, count=10, seconds=600 |
|---|
| 19 | |
|---|
| 20 | # Portscan and/or sensitive port attempts |
|---|
| 21 | watchfor /SEC-6-IPACCESSLOGP: list \d+ (permitted|denied) (tcp|udp) ([a-fA-F0-9.:]+)\((\d+)\) -> ([a-fA-F0-9.:]+)\((\d+)\), \d+ packet/ |
|---|
| 22 | mail=monitoring,subject=Attempt to connect to $2/$5:$6 from $3:$4 |
|---|
| 23 | threshold track_by=$3, type=limit, count=10, seconds=600 |
|---|
| 24 | |
|---|