An analysis of data collected by Rapid7’s RDP and SSH honeypots between September 10, 2021, and September 9, 2022, found tens of millions of connection attempts. The honeypots captured 215,894 unique IP source addresses and 512,002 unique passwords across RDP and SSH honeypots. Almost all the passwords (99.997%) can be found in rockyou2021.txt.
Network Security
Password Report: Honeypot Data Shows Bot Attack Trends Against RDP, SSH
An analysis of data collected by Rapid7’s RDP and SSH honeypots between September 10, 2021, and September 9, 2022, found tens of millions of connection attempts. The honeypots captured 215,894 unique IP source addresses and 512,002 unique passwords across RDP and SSH honeypots. Almost all the passwords (99.997%) can be found in rockyou2021.txt. The post Password Report: Honeypot Data Shows Bot Attack Trends Against RDP, SSH appeared first on SecurityWeek.

Latest News
- TrueConf Zero-Day Exploited in Asian Government Attacks
- In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware
- Critical ShareFile Flaws Lead to Unauthenticated RCE
- Mobile Attack Surface Expands as Enterprises Lose Control
- React2Shell Exploited in Large-Scale Credential Harvesting Campaign
- T-Mobile Sets the Record Straight on Latest Data Breach Filing
- North Korean Hackers Drain $285 Million From Drift in 10 Seconds
- Critical Vulnerability in Claude Code Emerges Days After Source Leak
