Honeypot Fun
| Login Attempts | IP Address | Country |
|---|---|---|
| 1 | 146.66.163.107 | Russia |
| 3 | 185.103.252.14 | Russia |
| 9 | 195.154.58.76 | France |
| 18 | 159.122.123.183 | Germany |
| 40 | 117.102.109.18 | Indonesia |
| 41 | 193.201.227.200 | Ukraine |
| 91 | 94.79.5.102 | Russia |
| 126 | 193.201.227.86 | Ukraine |
| 336 | 202.83.25.95 | India |
Remember that the country doesn't actually mean anything. These could be proxies, tor, hacked servers, etc.
The top usernames and passwords are not very surprising.
| Tries | Username / Password |
|---|---|
| 21 | [root/123456] |
| 19 | [root/default] |
| 18 | [admin/support] |
| 18 | [admin/default] |
| 18 | [admin/123123] |
| 8 | [root/admin] |
| 6 | [admin/admin] |
| 5 | [test/test] |
| 5 | [support/support] |
| 5 | [root/qwerty] |
Probably the most interesting thing is that the first attack was that the first attack was trying some sort of buffer-overflow. Although they were connecting to SSH and sending (weird) user/pass combinations, after the connection was rejected they were sending really long strings. I suspect it is some sort of honeypot detection, or it exploits certain versions of SSH? Not sure.
Anyway, for a 1 hour project it is easy and interesting. Definitely something that students could do in an afternoon.
