Who Is That Knocking at My (SSH) Door?

· databases web · Source ↗

TLDR

  • A self-hosted server logged ~500 SSH login attempts in 7 days; fail2ban and disabled password auth blocked all of them.

Key Takeaways

  • Top attempted usernames: sheep (169), ubuntu (30), admin (52), user (20) – each reflecting real attacker heuristics.
  • sheep attempts likely mirror the server’s subdomain, suggesting scripts fingerprint hostnames before attempting logins.
  • Service-specific accounts (frappe, postgres, odoo, jenkins) targeted – attackers hunt sloppily deployed test stacks with default creds.
  • pi and orangepi attempts confirm IoT/SBC devices are active targets even for low-value payoffs.
  • Mitigations used: disable root login, disable password auth entirely, aggressive fail2ban with a 100+ IP blocklist.

Hacker News Comment Review

  • No substantive HN discussion yet.

Original | Discuss on HN