Daily Threat Report
Top Attacker IPs
- ๐ 172.23.0.2 BGPโ
- ๐ 171.243.148.80 BGPโ
- ๐ 87.251.64.176 BGPโ
- ๐ 116.110.11.33 BGPโ
- ๐ 116.110.5.114 BGPโ
Top Passwords Tried
- admin
- 123456
- 1234
- password
- 12345678
๐ WEB HONEYPOT โ Galah LLM
AI-generated fake HTTP responses served to 106 scanner requests from 51 unique IPs. Model: qwen2.5:0.5b (local, offline).
Top Paths Probed
- /
- /sitemap.xml
- /favicon.ico
- /.git/config
- /zc?action=getInfo
Top User-Agents
- Mozilla/5.0 (Windows NT 10.0
- Win64
- x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46
- Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko
- compatible
- ClaudeBot/1.0
- +claudebot@anthropic.com)
- Mozilla/5.0 (compatible
- Infrawatch/1.0
- +https://infrawat.ch/)
- Umai-Scanner/2.0 (+https://umai.entelijan.com/methodology)
# Automatic multi-platform threat intel reporting $ honeypot-report.sh --since 24h โ 172 IPs โ AbuseIPDB (community confidence scores updated) โ 172 IPs โ AlienVault OTX (pulse indicators added) โ 172 IPs โ Blocklist.de (auto-ban list updated) โ 172 IPs โ DShield/SANS (global threat feed updated)
๐คฃ ATTACKER COMEDY CORNER
Real attempts. No actors were harmed in the making of this honeypot.
๐ Hall of Shame โ Passwords
111111 123321z 12345678 123456789 1234567890%*() 1234567890-= 1q2w3e4r 696969 abc123 admin123 ๐ป Commands They Tried
uname -a These are real credentials and commands attempted by automated scanners and script kiddies. Logged, reported, and immortalized.
Automated report for 27 de April de 2026. Recorded 784 SSH connections on the Cowrie honeypot and 362 multi-protocol events on OpenCanary, from 101 unique IPs. 172 IPs were automatically reported to the AbuseIPDB community database.
SSH Activity (Cowrie)
The SSH honeypot received 1112 login attempts from 77 unique IPs. Attackers executed 9 commands after gaining simulated system access.
Multi-Protocol Activity (OpenCanary)
Detected 362 events across services including FTP, Telnet, MySQL, Redis, VNC and Git from 24 distinct IPs. All events are access attempts against simulated production services.
HTTP Web Honeypot (Galah LLM)
The web honeypot received 106 HTTP requests from real scanners across 51 unique IPs.
Each attacker received a fake response generated in real time by the local AI model qwen2.5:0.5b (Ollama, no internet connection required).