| ▲ | djkurlander 2 hours ago | |||||||
That’s a valid point. We can easily see where the attack is coming from but not who or which botnet. Some of these can be inferred by the pattern of usernames and passwords attempted, and the ISPs. Someone suggested that I collect the client SSH signature as well, which would help. But you’re right, we don’t know who is behind the attacks. | ||||||||
| ▲ | mmarian 2 hours ago | parent | next [-] | |||||||
I'm guessing the SSH signatures can rotate as well. I remember someone did an analysis of rotation patterns for HTTPS requests; that's when they saw some interesting clusters. | ||||||||
| ▲ | prox 2 hours ago | parent | prev [-] | |||||||
I saw an ISP called Microsoft, USA… is that an official microsoft computer doing that or something else? | ||||||||
| ||||||||