<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Viewing SSH local Destination IP for authentication attempts in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5335666#M1123025</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/867366"&gt;@SCDow&lt;/a&gt;&amp;nbsp;I'm using a named ACL on the VTY lines and I get source and destination IP/ports.&lt;/P&gt;
&lt;P&gt;*Oct 3 11:12:37.569: %SEC-6-IPACCESSLOGP: list ACL-VTY permitted tcp &lt;STRONG&gt;192.168.6.10(51744)&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;192.168.6.2(22),&lt;/STRONG&gt; 1 packet&lt;BR /&gt;*Oct 3 11:13:01.355: %SEC-6-IPACCESSLOGP: list ACL-VTY denied tcp &lt;STRONG&gt;192.168.6.10(51763)&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;192.168.6.2(23&lt;/STRONG&gt;), 1 packet&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 03 Oct 2025 11:23:05 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2025-10-03T11:23:05Z</dc:date>
    <item>
      <title>Viewing SSH local Destination IP for authentication attempts</title>
      <link>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5335420#M1123011</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;&lt;P&gt;Raising within this community board because it had the most hits for SSH questions,&lt;/P&gt;&lt;P&gt;I have a number of "%SEC_LOGIN-4-LOGIN_FAILED" failed SSH authentication attempts which I've tracked down to being a scanning-type behaviour from a customer's 3rd party service provider. Unfortunately it's so persistent, and widespread, that it has backed a number of routers into Quiet Mode.&lt;/P&gt;&lt;P&gt;This isn't the only affected router, and there are a number of solutions, however just from an intellectual standpoint let's say I'm going to ask the 3rd party to stop spraying a certain range of IPs.&lt;/P&gt;&lt;P&gt;When I check the logs I get:&lt;BR /&gt;[Sanitised]&lt;/P&gt;&lt;P&gt;"000000: Oct 02 2025 00:00:00.000 NTP: %SEC_LOGIN-4-LOGIN_FAILED: Login failed [user: 3RD_PARTY] [Source: 10.0.0.1] [localport: 22] [Reason: Login Authentication Failed] at 00:00:00 NTP Thu Oct 02 2025"&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;QUESTION:&lt;/STRONG&gt;&lt;BR /&gt;Is there a way for me to see what destination (local) IP this address was attempting to log on to? I have 3 management loopbacks and an interface IP I believe they could be hitting.&lt;/P&gt;&lt;P&gt;I've searched "&lt;EM&gt;ip ssh debug&lt;/EM&gt;" command sample output, and scoured many threads, but cannot see what I need.&lt;/P&gt;&lt;P&gt;I also realise this may be a question that's too dumb to have been asked, so please, if this is obvious just spell it out to me...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2025 13:48:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5335420#M1123011</guid>
      <dc:creator>SCDow</dc:creator>
      <dc:date>2025-10-02T13:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: Viewing SSH local Destination IP for authentication attempts</title>
      <link>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5335422#M1123012</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/867366"&gt;@SCDow&lt;/a&gt; An ACL with logging should capture the source/destination IP and port. Any reason why you not configure a VTY line ACL to block those connection attempts from putting your router into quiet mode in the first place?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2025 14:15:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5335422#M1123012</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-10-02T14:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: Viewing SSH local Destination IP for authentication attempts</title>
      <link>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5335466#M1123013</link>
      <description>&lt;P&gt;Its all depends on the network, if you have any firewall in front, you can view that Logs or enable Logs and send to syslog to investigate.&lt;/P&gt;
&lt;P&gt;Also make ACL to allow only required IP for SSH connection for best practice.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2025 15:06:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5335466#M1123013</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-10-02T15:06:26Z</dc:date>
    </item>
    <item>
      <title>Re: Viewing SSH local Destination IP for authentication attempts</title>
      <link>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5335660#M1123022</link>
      <description>&lt;P&gt;Absolutely, there are a few solutions to tackle the SSH attempts, there is currently an ACL allowing the 10.x.x.x /8 as the customer's private addressing space, but we hadn't expected these SSH attempts from within their network. They're coming from a 3rd party service provider who haven't been directed or authorised to probe SSH, so I could exclude their addresses, but I wanted to find the range they're sweeping - is SSH being attempted on Loopback 2, Loopback 3, the WAN interface IP, etc.&lt;/P&gt;&lt;P&gt;I tried the log suggestion and modified entry 100 to "100 permit 10.0.0.0 0.255.255.255 log", however this didn't give me the local destination IP or interface on which the SSH was targeted to, but instead just logged any hits as a counter:&lt;BR /&gt;&lt;BR /&gt;"000000: Oct 2 2025 00:00:00.000 NTP: %SEC-6-IPACCESSLOGS: list 10 permitted 10.0.0.1 1 packet"&lt;/P&gt;&lt;P&gt;I'm a little baffled as to why the local destination IP/interface isn't included in the existing "%SEC_LOGIN-4-LOGIN_FAILED:" log, only "[localport: 22]"?&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 11:18:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5335660#M1123022</guid>
      <dc:creator>SCDow</dc:creator>
      <dc:date>2025-10-03T11:18:30Z</dc:date>
    </item>
    <item>
      <title>Re: Viewing SSH local Destination IP for authentication attempts</title>
      <link>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5335664#M1123024</link>
      <description>&lt;P&gt;Yes I totally agree. In this case these are from within the private address space for that customer, and this is "rogue" behaviour from one of their 3rd party service providers, no firewalls in the way unfortunately.&lt;/P&gt;&lt;P&gt;This is more of a "where do I find this..." question for theory knowledge. My thoughts are, surely&amp;nbsp;IOS XE Cupertino 17.9.x on a 1117 router captures that detail and not just "[localport: 22]"? And it's either that or I'm being stupid... Could be my knowledge of fundamentals for SSH negotiation is lacking! I believe any Loopback and the WAN interface IP all accept SSH requests unless configured not to? Then it should log which one has been hit.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 11:18:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5335664#M1123024</guid>
      <dc:creator>SCDow</dc:creator>
      <dc:date>2025-10-03T11:18:02Z</dc:date>
    </item>
    <item>
      <title>Re: Viewing SSH local Destination IP for authentication attempts</title>
      <link>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5335666#M1123025</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/867366"&gt;@SCDow&lt;/a&gt;&amp;nbsp;I'm using a named ACL on the VTY lines and I get source and destination IP/ports.&lt;/P&gt;
&lt;P&gt;*Oct 3 11:12:37.569: %SEC-6-IPACCESSLOGP: list ACL-VTY permitted tcp &lt;STRONG&gt;192.168.6.10(51744)&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;192.168.6.2(22),&lt;/STRONG&gt; 1 packet&lt;BR /&gt;*Oct 3 11:13:01.355: %SEC-6-IPACCESSLOGP: list ACL-VTY denied tcp &lt;STRONG&gt;192.168.6.10(51763)&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;192.168.6.2(23&lt;/STRONG&gt;), 1 packet&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 11:23:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5335666#M1123025</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-10-03T11:23:05Z</dc:date>
    </item>
    <item>
      <title>Re: Viewing SSH local Destination IP for authentication attempts</title>
      <link>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5335695#M1123031</link>
      <description>&lt;P&gt;Excellent, this could be the subtlety I needed - my access lists are standard numbered by default. I'll try replicating it as named and switch that in, and return with the results&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 14:08:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5335695#M1123031</guid>
      <dc:creator>SCDow</dc:creator>
      <dc:date>2025-10-03T14:08:08Z</dc:date>
    </item>
    <item>
      <title>Re: Viewing SSH local Destination IP for authentication attempts</title>
      <link>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5335719#M1123035</link>
      <description>&lt;P&gt;sure if you have ACL with Logs you can find&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp; provided the example&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 15:54:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5335719#M1123035</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-10-03T15:54:27Z</dc:date>
    </item>
    <item>
      <title>Re: Viewing SSH local Destination IP for authentication attempts</title>
      <link>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5336476#M1123074</link>
      <description>&lt;P&gt;Great stuff thank you Rob, that got me the info I was needing!&lt;/P&gt;&lt;P&gt;I wasn't thinking outside of the box there, I was thinking, "Surely there's a 'debug' clause or something I can use to invoke the collection of a destination IP/Interface within the SSH command set..."&lt;/P&gt;&lt;P&gt;As it turns out, there isn't, but the Extended ACL saved the day as it inherently logs both source and destination.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Oct 2025 11:17:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/viewing-ssh-local-destination-ip-for-authentication-attempts/m-p/5336476#M1123074</guid>
      <dc:creator>SCDow</dc:creator>
      <dc:date>2025-10-07T11:17:33Z</dc:date>
    </item>
  </channel>
</rss>

