TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Honeypot analysis - Looking closer at SSH scans (user and passwords used)

28 pointsby j_lagofover 15 years ago

3 comments

ddbbover 15 years ago
Good job researching those pesky brute force scans. Is there anyway you can post the complete list with all the data collected instead of just the top 50?
jhancockover 15 years ago
Nice analysis.<p>[advice for those not doing it right]: if your sshd config allows id/pw login, turn this off and only use kays. Also, move your sshd listener port to something besides 22 to eliminate most of the bot login attempts in your log files.
评论 #1053888 未加载
bigiainover 15 years ago
I wonder if the lack of root:alpine and mobile:dottie indicates the attack tools are smart enough to know the OS of the box they're attacking, or just a lack of interest in owning jailbroken iPhones?