DEV Community

Cover image for Honeypot Experiment Shows the Relentless Reality of SSH Brute-Force Attacks
BeyondMachines for BeyondMachines

Posted on • Originally published at beyondmachines.net

Honeypot Experiment Shows the Relentless Reality of SSH Brute-Force Attacks

Summary

A 54-day SSH honeypot experiment recorded 269,000 automated connection attempts, revealing a trend of threat actors interested in Solana blockchain nodes and IoT devices using hardcoded credentials.

Take Action:

Disable password-based SSH authentication entirely and switch to SSH key authentication, as automated botnets are constantly hammering port 22 with millions of password guesses including default IoT and crypto-infrastructure credentials. Restrict SSH access to trusted IP addresses only (via firewall rules or VPN), change the default port if possible.


Read the full article on BeyondMachines


This article was originally published on BeyondMachines

Top comments (0)