Daily Threat Report
Top Attacker IPs
- ๐ 45.156.87.204 BGPโ
- ๐ 176.65.132.254 BGPโ
- ๐ 87.251.64.176 BGPโ
- ๐ 87.251.64.145 BGPโ
- ๐ 87.251.64.144 BGPโ
Top Passwords Tried
- 123456
- admin
- 123
- password
- 1234
๐ WEB HONEYPOT โ Galah LLM
AI-generated fake HTTP responses served to 35 scanner requests from 14 unique IPs. Model: qwen2.5:0.5b (local, offline).
Top Paths Probed
- /SDK/webLanguage
- /sitemap.xml
- /
- /login
- /json/
Top User-Agents
- Mozilla/5.0 (Windows NT 10.0
- Win64
- x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46
- Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko
- compatible
- ClaudeBot/1.0
- +claudebot@anthropic.com)
- Go-http-client/1.1
- Mozilla/5.0 (compatible
- CensysInspect/1.1
- +https://about.censys.io/)
# Automatic multi-platform threat intel reporting $ honeypot-report.sh --since 24h โ 12 IPs โ AbuseIPDB (community confidence scores updated) โ 12 IPs โ AlienVault OTX (pulse indicators added) โ 12 IPs โ Blocklist.de (auto-ban list updated) โ 12 IPs โ DShield/SANS (global threat feed updated)
๐คฃ ATTACKER COMEDY CORNER
Real attempts. No actors were harmed in the making of this honeypot.
๐ Hall of Shame โ Passwords
admin password abc123 1qaz@WSX qwe123 ๐ป Commands They Tried
uname -a uname -a;w uname -s -m uname -s -v -n -r -m These are real credentials and commands attempted by automated scanners and script kiddies. Logged, reported, and immortalized.
Automated report for 6 de May de 2026. Recorded 1797 SSH connections on the Cowrie honeypot and 132 multi-protocol events on OpenCanary, from 84 unique IPs. 12 IPs were automatically reported to the AbuseIPDB community database.
SSH Activity (Cowrie)
The SSH honeypot received 2251 login attempts from 73 unique IPs. Attackers executed 355 commands after gaining simulated system access.
Multi-Protocol Activity (OpenCanary)
Detected 132 events across services including FTP, Telnet, MySQL, Redis, VNC and Git from 11 distinct IPs. All events are access attempts against simulated production services.
HTTP Web Honeypot (Galah LLM)
The web honeypot received 35 HTTP requests from real scanners across 14 unique IPs.
Each attacker received a fake response generated in real time by the local AI model qwen2.5:0.5b (Ollama, no internet connection required).