Total login attempts | 485014 |
---|
Distinct source IP addresses | 79935 |
---|
Active time period | |
---|---|
Start date (first attack) | End date (last attack) |
Saturday, 13-Dec-2014, 18:48 PM | Monday, 28-Feb-2022, 22:32 PM |
This vertical bar chart displays the top 10 passwords that attackers try when attacking the system.
This vertical bar chart displays the top 10 usernames that attackers try when attacking the system.
This vertical bar chart displays the top 10 username and password combinations that attackers try when attacking the system.
CSV of all distinct combinations
This pie chart displays the top 10 username and password combinations that attackers try when attacking the system.
This vertical bar chart displays the overall attack success ratio for the particular honeypot system.
CSV of all successfull attacks
This vertical bar chart displays the most successful break-ins per day (Top 20) for the particular honeypot system. The numbers indicate how many times correct credentials were given by attackers.
This line chart displays the daily successes on the honeypot system. Spikes indicate successful
entries over a weekly period.
Warning: Dates with zero successes are
not displayed.
This line chart displays the weekly successes on the honeypot system. Curves indicate successful entries over a weekly period.
This vertical bar chart displays the top 10 unique IPs ordered by the number of overall connections to the system.
This pie chart displays the top 10 unique IPs ordered by the number of overall connections to the system.
This vertical bar chart displays the number of successful logins from the same IP address (Top 20). The numbers indicate how many times the particular source opened a successful session.
This horizontal bar chart displays the most probes per day (Top 20) against the honeypot system.
This line chart displays the daily activity on the honeypot system. Spikes indicate hacking
attempts.
Warning: Dates with zero probes are not displayed.
This line chart displays the weekly activity on the honeypot system. Curves indicate hacking attempts over a weekly period.
This vertical bar chart displays the top 10 SSH clients used by attackers during their hacking attempts.