toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

274
active users

#botnets

0 posts0 participants0 posts today
Schneier on Security RSS<p>Google Sues the Badbox Botnet Operators</p><p>It will be interesting to watch what will come of this private lawsuit:<br>Google on Thursday announced filing a lawsuit again... <a href="https://www.schneier.com/blog/archives/2025/07/google-sues-the-badbox-botnet-operators.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/07/google-sues-the-badbox-botnet-operators.html</span></a></p><p> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/backdoors" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backdoors</span></a> <a href="https://burn.capital/tags/botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnets</span></a> <a href="https://burn.capital/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://burn.capital/tags/courts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>courts</span></a> <a href="https://burn.capital/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a></p>
securityaffairs<p>Disrupting the operations of&nbsp;cryptocurrency mining&nbsp;<a href="https://infosec.exchange/tags/botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnets</span></a><br><a href="https://securityaffairs.com/179310/malware/disrupting-operations-of-cryptocurrency-mining-botnets.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/179310/mal</span><span class="invisible">ware/disrupting-operations-of-cryptocurrency-mining-botnets.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
PrivacyDigest<p>Feds charge 16 <a href="https://mas.to/tags/Russians" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russians</span></a> allegedly tied to <a href="https://mas.to/tags/botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnets</span></a> used in <a href="https://mas.to/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattacks</span></a> and <a href="https://mas.to/tags/spying" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spying</span></a> <br><a href="https://mas.to/tags/russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>russia</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p><p><a href="https://arstechnica.com/security/2025/05/feds-charge-16-russians-allegedly-tied-to-botnets-used-in-cyberattacks-and-spying/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">05/feds-charge-16-russians-allegedly-tied-to-botnets-used-in-cyberattacks-and-spying/</span></a></p>
PrivacyDigest<p>Feds Charge 16 <a href="https://mas.to/tags/Russians" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russians</span></a> Allegedly Tied to <a href="https://mas.to/tags/Botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Botnets</span></a> Used in <a href="https://mas.to/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> , <a href="https://mas.to/tags/Cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberattacks</span></a> , and <a href="https://mas.to/tags/Spying" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spying</span></a> </p><p>A new US <a href="https://mas.to/tags/indictment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>indictment</span></a> against a group of Russian nationals offers a clear example of how, authorities say, a single <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> operation can enable both criminal and state-sponsored <a href="https://mas.to/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a>.<br><a href="https://mas.to/tags/russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>russia</span></a></p><p><a href="https://www.wired.com/story/us-charges-16-russians-danabot-malware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/us-charges-16-</span><span class="invisible">russians-danabot-malware/</span></a></p>
Manuel 'HonkHase' Atug<p>Feds Charge 16 Russians Allegedly Tied to <a href="https://chaos.social/tags/Botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Botnets</span></a> Used in <a href="https://chaos.social/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a>, Cyberattacks, and <a href="https://chaos.social/tags/Spying" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spying</span></a></p><p>"A new US indictment against a group of Russian nationals offers a clear example of how, authorities say, a single <a href="https://chaos.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> operation can enable both criminal and state-sponsored hacking."<br><a href="https://www.wired.com/story/us-charges-16-russians-danabot-malware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/us-charges-16-</span><span class="invisible">russians-danabot-malware/</span></a></p>
ResearchBuzz: Firehose<p>Krebs on Security: KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS. “KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits of data per second (a terabit is one trillion bits of data). The brief attack appears to have been a test run for a massive new Internet of Things (IoT) botnet capable of launching […]</p><p><a href="https://rbfirehose.com/2025/05/22/krebs-on-security-krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/" class="" rel="nofollow noopener" target="_blank">https://rbfirehose.com/2025/05/22/krebs-on-security-krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/</a></p>
ResearchBuzz: Firehose<p>The Register: Feds disrupt proxy-for-hire botnet, indict four alleged net miscreants. “Earlier this week, the FBI urged folks to bin aging routers vulnerable to hijacking, citing ongoing attacks linked to TheMoon malware. In a related move, the US Department of Justice unsealed indictments against four foreign nationals accused of running a long-running proxy-for-hire network that exploited […]</p><p><a href="https://rbfirehose.com/2025/05/14/the-register-feds-disrupt-proxy-for-hire-botnet-indict-four-alleged-net-miscreants/" class="" rel="nofollow noopener" target="_blank">https://rbfirehose.com/2025/05/14/the-register-feds-disrupt-proxy-for-hire-botnet-indict-four-alleged-net-miscreants/</a></p>
LMG Security<p>The FBI has issued an alert about cybercriminals hijacking outdated routers to power massive proxy-for-hire networks—masking malware, fraud, and credential theft right under your nose.</p><p>Watch the full Cyberside Chats episode to hear <span class="h-card" translate="no"><a href="https://infosec.exchange/@sherridavidoff" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sherridavidoff</span></a></span> and <span class="h-card" translate="no"><a href="https://infosec.exchange/@MDurrin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>MDurrin</span></a></span> 's insights on:</p><p>🔹 The FBI’s May 2025 alert<br>🔹 TheMoon malware and the Faceless proxy service<br>🔹 What these botnets mean for your enterprise<br>🔹 What you need to do now to stay protected</p><p>🎥 Watch the video: <a href="https://youtu.be/x_40BlvWsHk" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/x_40BlvWsHk</span><span class="invisible"></span></a><br>🎧 Listen to the podcast: <a href="https://www.chatcyberside.com/e/outdated-routers-a-hidden-threat-in-your-neighborhood/?token=b0b648ff9ddf79f7cb1099945c74f7f0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">chatcyberside.com/e/outdated-r</span><span class="invisible">outers-a-hidden-threat-in-your-neighborhood/?token=b0b648ff9ddf79f7cb1099945c74f7f0</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/RouterSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RouterSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/CybersideChats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CybersideChats</span></a> <a href="https://infosec.exchange/tags/ProxyAbuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProxyAbuse</span></a> <a href="https://infosec.exchange/tags/TheMoonMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheMoonMalware</span></a> <a href="https://infosec.exchange/tags/Botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Botnets</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://infosec.exchange/tags/CIO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CIO</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a></p>
Schneier on Security RSS<p>AI Data Poisoning</p><p>Cloudflare has a new feature—available to free users as well—that uses AI to generate random pages to feed to AI... <a href="https://www.schneier.com/blog/archives/2025/03/ai-data-poisoning.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/03/ai-data-poisoning.html</span></a></p><p> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spoofing</span></a> <a href="https://burn.capital/tags/botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnets</span></a> <a href="https://burn.capital/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a></p>
The Spamhaus Project<p>We strongly recommend against providing services to entities whose AS or IP networks are listed in Spamhaus (ASN-)DROP - learn more here 👉 <a href="https://www.spamhaus.org/blocklists/do-not-route-or-peer/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">spamhaus.org/blocklists/do-not</span><span class="invisible">-route-or-peer/</span></a></p><p><a href="https://infosec.exchange/tags/BulletproofHosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BulletproofHosting</span></a> <a href="https://infosec.exchange/tags/DROP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DROP</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/Botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Botnets</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a></p>
Schneier on Security RSS<p>TP-Link Router Botnet</p><p>There is a new botnet that is infecting TP-Link routers:<br>The botnet can lead to comma... <a href="https://www.schneier.com/blog/archives/2025/03/tp-link-router-botnet.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/03/tp-link-router-botnet.html</span></a></p><p> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnets</span></a> <a href="https://burn.capital/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
ResearchBuzz: Firehose<p>Ars Technica: Massive botnet that appeared overnight is delivering record-size DDoSes. “A newly discovered network botnet comprising an estimated 30,000 webcams and video recorders—with the largest concentration in the US—has been delivering what is likely to be the biggest denial-of-service attack ever seen, a security researcher inside Nokia said.”</p><p><a href="https://rbfirehose.com/2025/03/08/ars-technica-massive-botnet-that-appeared-overnight-is-delivering-record-size-ddoses/" class="" rel="nofollow noopener" target="_blank">https://rbfirehose.com/2025/03/08/ars-technica-massive-botnet-that-appeared-overnight-is-delivering-record-size-ddoses/</a></p>
Angus McIntyre<p>The Internet of Shit is on the attack again, with a suspected Mirai-derivative botnet composed largely of compromised security cameras delivering a massive volumetric DDoS. Sweet.</p><p><a href="https://mastodon.social/tags/BotNets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BotNets</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/IOT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IOT</span></a> <a href="https://mastodon.social/@arstechnica/114115698112535544" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.social/@arstechnica/1</span><span class="invisible">14115698112535544</span></a></p>
IT News<p>Massive botnet that appeared overnight is delivering record-size DDoSes - A newly discovered network botnet comprising&nbsp;an estimated 30,000 webcams a... - <a href="https://arstechnica.com/security/2025/03/massive-botnet-that-appeared-overnight-is-delivering-record-size-ddoses/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">03/massive-botnet-that-appeared-overnight-is-delivering-record-size-ddoses/</span></a> <a href="https://schleuss.online/tags/distributeddenialofserviceattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>distributeddenialofserviceattacks</span></a> <a href="https://schleuss.online/tags/internetofthings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internetofthings</span></a> <a href="https://schleuss.online/tags/uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>uncategorized</span></a> <a href="https://schleuss.online/tags/ddosattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddosattacks</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnets</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>&amp;it</p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>Two <a href="https://kolektiva.social/tags/botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnets</span></a> tracked as ‘ <a href="https://kolektiva.social/tags/Ficora" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ficora</span></a>’ and ‘ <a href="https://kolektiva.social/tags/Capsaicin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Capsaicin</span></a>’ have recorded increased activity in targeting D-Link routers that have reached end of life or are running outdated firmware versions. <a href="https://kolektiva.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://kolektiva.social/tags/DLinkrouters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DLinkrouters</span></a> <a href="https://www.bleepingcomputer.com/news/security/malware-botnets-exploit-outdated-d-link-routers-in-recent-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/malware-botnets-exploit-outdated-d-link-routers-in-recent-attacks/</span></a></p>
david poertner<p>Habeck is a fool for joining former <a href="https://social.cologne/tags/twitter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>twitter</span></a> again. All still using twitter are enabling <a href="https://social.cologne/tags/EvilElon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EvilElon</span></a>, his algorithms favoring his and other <a href="https://social.cologne/tags/rightwing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rightwing</span></a> tweets and Russian <a href="https://social.cologne/tags/botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnets</span></a>.<br>There is no political discussion on twitter, but disinformation and propaganda and every serious politician is just legitimizing the <a href="https://social.cologne/tags/populists" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>populists</span></a>.<br>From <a href="https://social.cologne/tags/Musk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Musk</span></a> there is nothing else to be expected, he is a <a href="https://social.cologne/tags/bully" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bully</span></a>.<br><a href="https://norden.social/@hart/113460718424232580" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">norden.social/@hart/1134607184</span><span class="invisible">24232580</span></a></p>
Schneier on Security RSS<p>IoT Devices in Password-Spraying Botnet</p><p>Microsoft is warning Azure cloud users that a Chinese controlled botnet is engaging in “highly evas... <a href="https://www.schneier.com/blog/archives/2024/11/iot-devices-in-password-spraying-botnet.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">4/11/iot-devices-in-password-spraying-botnet.html</span></a></p><p> <a href="https://burn.capital/tags/InternetofThings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InternetofThings</span></a> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwords</span></a> <a href="https://burn.capital/tags/botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnets</span></a> <a href="https://burn.capital/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a></p>
IT News<p>Thousands of hacked TP-Link routers used in years-long account takeover attacks - Hackers working on behalf of the Chinese government are using a botnet of ... - <a href="https://arstechnica.com/information-technology/2024/11/microsoft-warns-of-8000-strong-botnet-used-in-password-spraying-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/information-te</span><span class="invisible">chnology/2024/11/microsoft-warns-of-8000-strong-botnet-used-in-password-spraying-attacks/</span></a> <a href="https://schleuss.online/tags/passwordspraying" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwordspraying</span></a> <a href="https://schleuss.online/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnets</span></a> <a href="https://schleuss.online/tags/tp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tp</span></a>-link <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>&amp;it</p>
Peter N. M. Hansteen<p>More data points - today's is </p><p>Oct 6 02:03:53 skapet sshd-session[76897]: Failed password for invalid user Can't open ikk from 2a02:4780:10:42bf::1 port 43964 ssh2</p><p>More likely than not a variant of spamto database gone awol like back in the day <a href="https://nxdomain.no/~peter/so_somebody_is_throwing_html_at_your_sshd.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/so_somebody</span><span class="invisible">_is_throwing_html_at_your_sshd.html</span></a> (prettified, tracked <a href="https://bsdly.blogspot.com/2016/12/so-somebody-is-throwing-html-at-your.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsdly.blogspot.com/2016/12/so-</span><span class="invisible">somebody-is-throwing-html-at-your.html</span></a>) but still hilarious </p><p><a href="https://mastodon.social/tags/sshgropers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sshgropers</span></a> <a href="https://mastodon.social/tags/passwordgroping" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwordgroping</span></a> <a href="https://mastodon.social/tags/bruteforce" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bruteforce</span></a> <a href="https://mastodon.social/tags/shitheadery" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shitheadery</span></a> <a href="https://mastodon.social/tags/botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnets</span></a> <a href="https://mastodon.social/tags/sillybuggers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sillybuggers</span></a> <a href="https://mastodon.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a></p>
Peter N. M. Hansteen<p>Another data point in the "you thought you had seen it all, but no siree" set - </p><p>Oct 4 13:34:04 skapet sshd-session[38440]: Failed password for invalid user Can't open ica from 2001:df7:3c00:800a::446:34dc port 54770 ssh2</p><p>(and from several other locations)</p><p><a href="https://mastodon.social/tags/sshgropers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sshgropers</span></a> <a href="https://mastodon.social/tags/passwordgroping" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwordgroping</span></a> <a href="https://mastodon.social/tags/bruteforce" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bruteforce</span></a> <a href="https://mastodon.social/tags/shitheadery" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shitheadery</span></a> <a href="https://mastodon.social/tags/botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnets</span></a> <a href="https://mastodon.social/tags/sillybuggers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sillybuggers</span></a></p>