Our great sponsors
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
sshesame
An easy to set up and use SSH honeypot, a fake SSH server that lets anyone in and logs their activity
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
check out https://github.com/regit/pshitt
Do yourself a favor and load up your iptables with the ipsum blacklist.
I started an SSH honeypot project with the goal of finding out what these attackers (bots mainly) would do if they did get in.
I run endlessh on my home server. It's an ssh tarpit, which means it isn't actually an ssh server at all, it just poses as an ssh server to any connection, and after the initial handshake, it just infinitely and very slowly continues to send ssh banner data to the client.
It's Linux mining OS and looks like someone is scanning for potential targets. Unsuccessfully that is, because OS is by default locked from outside access.