These are real time attempts to break into my servers by attackers trying to guess usernames and passwords. No legitimate services are offered on the addresses receiving these attempts, so there is no chance of a real user accidently submitting their credentials. (Yes things other than SSH occasionally show up)
🥳 Happy 10 months of brute failing. I am now generating stats based on historical data (updated every 2 hours). know what an "average" machine is hit with. I currently have two IPs collecting traffic, so you can roughly divide the numbers in half if you want to know what is "average."
Waiting for WebSocket | Brute.Fail is a Mike Damm jam.

Source Protocol Username Password