| ▲ | mmarian 3 hours ago | ||||||||||||||||||||||
> who keeps trying to log into your computer? I'm curious, how do you think this helps you answer the question? Proxies are incredibly easy to come by these days, rotation makes it hard to identify what's behind it all. | |||||||||||||||||||||||
| ▲ | djkurlander 2 hours ago | parent [-] | ||||||||||||||||||||||
That’s a valid point. We can easily see where the attack is coming from but not who or which botnet. Some of these can be inferred by the pattern of usernames and passwords attempted, and the ISPs. Someone suggested that I collect the client SSH signature as well, which would help. But you’re right, we don’t know who is behind the attacks. | |||||||||||||||||||||||
| |||||||||||||||||||||||