New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
Holy shit, Rick Hunter?
It is the UNIX timestamp of the time when the command was executed.
https://en.wikipedia.org/wiki/Unix_time
Sorry for ruining everyones oppurtunity to troll
what is rick doing here ? asking for that number of IPs ?
@Makenai is correct, they are the UNIX timestamps. You can convert them to human readable format by running
date -d @[timestamp here]
. You can also use the commandhistory
to show the commands and the time they were executed.(I assume you have the variable
HISTTIMEFORMAT
exported, as these timestamps do not show by default unless I export that variable in my experience: i.eexport HISTTIMEFORMAT="%d/%m/%y %T "
)rkhunter is a toolkit that looks for rootkits on your container. It might be part of the host's automated security checks. Who is your host?
Linux uses
Epoch
time, this is the number of seconds since 1/1/1970. Nothing to worry about with this bash history.http://www.epochconverter.com/
1470972530 = Fri, 12 Aug 2016 03:28:50 GMT
You may wish to consider locking down your exposed services just for piece of mind.
https://wiki.centos.org/HowTos/Network/SecuringSSH
fail2ban - Monitors logins to services such as FTP, SSH - Requires a little bit of setup in config but it's relatively painless.
iptables or CSF http://configserver.com/cp/csf.html
NEVER refer to Rick Hunter as a tool. Yeah, he wasn't as cool as Max Sterling or Roy Fokker, but he was still fucking cool.
To be honest, this place is pretty boring without him.