If you have tried everything to stop this error message appearing on your terminal try to look into /etc/hosts.deny file on your sshd destination server to make sure that your external IP address is not black listed there to be denied ssh access.You can do this only by using a ssh client on different server which has an external IP address different from your own. So ssh somewhere else and from there to your desired destination ( this is temporary workaround for this problem ). First get your external IP address. If you have a access to a browser navigate to ipchicken.com or use a following bash script:

#!/bin/bash

# NOTE: this script only works if your external IP address
# is listed on 35th line of ipchicken's output file.

wget -q http://ipchicken.com
echo My external IP address is: $( cat index.html | sed -n '35p' | awk '{ print $1 }')
rm index.html

Make the get-external-ip.sh bash script executable and execute:

chmod +x get-external-ip.sh
./get-external-ip.sh
My external IP address is: 113.194.30.111

Login to a destination server and execute a following command:

$ cat /etc/hosts.deny | grep 113.194.30.111

The output will look same or similar to the one below:

# DenyHosts: Fri Sep 24 14:58:17 2010 | sshd: 113.194.30.111
sshd: 113.194.30.111

Remove both lines form /etc/hosts.deny file and you are ready to go. If you do not have a write access to this file ask someone with write access to do it for you. Your IP address can be listed in /etc/hosts.deny file due to the paranoid settings of TCP_WRAPPERS ( multiple authentication denied etc. ) or it can be added deliberately by a system admin.



Free Linux eBooks

Do you have the right skills?

Our IT Skills Watch page reflects an up to date IT skills demand leaning towards the Linux and Unix environment. We have considered a number of skills and operating systems.

See the result...

Linux Online Training

Learn to run Linux servers and prepare for LPI certification with Linux Academy. 104 available video lessons with PDF course notes with your own server!

Go to top