๐Ÿ”ด high

Daily Threat Report

1,492 SSH Connections
1,358 Login Attempts
844 Commands Run
74 SSH Unique IPs
173 Protocol Events
11 Protocol IPs
83 Web Honeypot Hits
46 Web Honeypot IPs

Top Passwords Tried

  1. admin
  2. 123456
  3. 1234
  4. password
  5. 12345

๐ŸŒ WEB HONEYPOT โ€” Galah LLM

AI-generated fake HTTP responses served to 83 scanner requests from 46 unique IPs. Model: qwen2.5:0.5b (local, offline).

Top Paths Probed

  1. /
  2. /og-default.png
  3. api.ipify.org:443
  4. /wp-login.php
  5. /favicon.ico

Top User-Agents

  1. Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46
  2. vercel-favicon/1.0

๐Ÿคฃ ATTACKER COMEDY CORNER

Real attempts. No actors were harmed in the making of this honeypot.

๐Ÿ”‘ Hall of Shame โ€” Passwords

000000000000000
111111
123321
12345678
123456789
1234567890%*()
P@ssw0rd
abc123
admin123
azerty147

These are real credentials and commands attempted by automated scanners and script kiddies. Logged, reported, and immortalized.

Automated report for 25 de April de 2026. Recorded 1492 SSH connections on the Cowrie honeypot and 173 multi-protocol events on OpenCanary, from 85 unique IPs. 0 IPs were automatically reported to the AbuseIPDB community database.

SSH Activity (Cowrie)

The SSH honeypot received 1358 login attempts from 74 unique IPs. Attackers executed 844 commands after gaining simulated system access.

Multi-Protocol Activity (OpenCanary)

Detected 173 events across services including FTP, Telnet, MySQL, Redis, VNC and Git from 11 distinct IPs. All events are access attempts against simulated production services.

HTTP Web Honeypot (Galah LLM)

The web honeypot received 83 HTTP requests from real scanners across 46 unique IPs. Each attacker received a fake response generated in real time by the local AI model qwen2.5:0.5b (Ollama, no internet connection required).

โ† All Reports ๐Ÿ›ก๏ธ Subscribe to blocklists โ†’