TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Honeypot analysis - Looking closer at SSH scans (user and passwords used)

28 点作者 j_lagof超过 15 年前

3 条评论

ddbb超过 15 年前
Good job researching those pesky brute force scans. Is there anyway you can post the complete list with all the data collected instead of just the top 50?
jhancock超过 15 年前
Nice analysis.<p>[advice for those not doing it right]: if your sshd config allows id/pw login, turn this off and only use kays. Also, move your sshd listener port to something besides 22 to eliminate most of the bot login attempts in your log files.
评论 #1053888 未加载
bigiain超过 15 年前
I wonder if the lack of root:alpine and mobile:dottie indicates the attack tools are smart enough to know the OS of the box they're attacking, or just a lack of interest in owning jailbroken iPhones?