Aktualisiert: April 2026
Top 100 angegriffene SSH-Benutzernamen
Die am haufigsten verwendeten Benutzernamen bei SSH-Brute-Force-Angriffen. Vermeiden Sie vorhersehbare Benutzernamen.
| # | Username | Versuche | IPs |
|---|---|---|---|
| 1 | root | 3,871 | 334 |
| 2 | solana | 1,502 | 25 |
| 3 | sol | 1,468 | 25 |
| 4 | ubuntu | 1,314 | 206 |
| 5 | solv | 641 | 16 |
| 6 | admin | 631 | 79 |
| 7 | user | 597 | 162 |
| 8 | 345gs5662d34 | 449 | 193 |
| 9 | postgres | 349 | 85 |
| 10 | validator | 179 | 13 |
| 11 | steam | 177 | 128 |
| 12 | john | 139 | 12 |
| 13 | deploy | 136 | 74 |
| 14 | node | 124 | 13 |
| 15 | sa | 123 | 13 |
| 16 | ftpuser | 118 | 68 |
| 17 | test | 116 | 67 |
| 18 | lighthouse | 111 | 3 |
| 19 | oracle | 102 | 85 |
| 20 | guest | 92 | 52 |
| 21 | admin2 | 86 | 6 |
| 22 | firedancer | 81 | 8 |
| 23 | odoo | 73 | 33 |
| 24 | bot | 72 | 35 |
| 25 | mapr | 71 | 3 |
| 26 | n8n | 68 | 61 |
| 27 | raydium | 64 | 7 |
| 28 | hyper | 61 | 39 |
| 29 | administrator | 55 | 17 |
| 30 | testing | 55 | 52 |
| 31 | tim | 53 | 45 |
| 32 | vpn | 53 | 42 |
| 33 | dev | 49 | 31 |
| 34 | latitude | 49 | 2 |
| 35 | claude | 49 | 36 |
| 36 | slv | 48 | 1 |
| 37 | ethereum | 48 | 8 |
| 38 | trader | 48 | 4 |
| 39 | trading | 47 | 3 |
| 40 | ali | 43 | 28 |
| 41 | server | 42 | 37 |
| 42 | sammy | 41 | 33 |
| 43 | ftptestusr | 41 | 41 |
| 44 | ad | 40 | 40 |
| 45 | support | 39 | 9 |
| 46 | ps | 38 | 4 |
| 47 | server1 | 38 | 36 |
| 48 | solnode | 36 | 1 |
| 49 | frappe | 35 | 29 |
| 50 | elasticsearch | 34 | 32 |
| 51 | gitlab-runner | 34 | 30 |
| 52 | jibs | 31 | 4 |
| 53 | 3d | 31 | 4 |
| 54 | airflow | 30 | 3 |
| 55 | git | 30 | 25 |
| 56 | pzuser | 29 | 29 |
| 57 | teamspeak | 29 | 25 |
| 58 | jupyter | 28 | 2 |
| 59 | minima | 27 | 4 |
| 60 | grafana | 27 | 2 |
| 61 | roo | 27 | 27 |
| 62 | strapi | 26 | 1 |
| 63 | deployer | 26 | 13 |
| 64 | test1 | 25 | 20 |
| 65 | cexadmin | 25 | 1 |
| 66 | cexuser | 25 | 1 |
| 67 | jito | 24 | 3 |
| 68 | a | 24 | 5 |
| 69 | kong | 24 | 1 |
| 70 | ops | 24 | 5 |
| 71 | solr | 24 | 2 |
| 72 | superset | 23 | 1 |
| 73 | minecraft | 23 | 14 |
| 74 | ubnt | 23 | 9 |
| 75 | testftp | 22 | 15 |
| 76 | cmu | 21 | 1 |
| 77 | grid | 21 | 2 |
| 78 | operation | 21 | 3 |
| 79 | operator | 21 | 4 |
| 80 | testuser | 21 | 15 |
| 81 | nathaly | 20 | 1 |
| 82 | svn | 20 | 2 |
| 83 | svn-cmu | 20 | 1 |
| 84 | system | 20 | 4 |
| 85 | tavian | 20 | 1 |
| 86 | elsie | 20 | 1 |
| 87 | kaytlyn | 20 | 1 |
| 88 | shred | 20 | 2 |
| 89 | ronan | 20 | 1 |
| 90 | mustafa | 20 | 1 |
| 91 | squid | 20 | 4 |
| 92 | mari | 20 | 1 |
| 93 | chantal | 20 | 1 |
| 94 | billie | 20 | 1 |
| 95 | tyron | 20 | 1 |
| 96 | psadmin | 19 | 3 |
| 97 | 0 | 19 | 2 |
| 98 | raekwon | 19 | 1 |
| 99 | admin1 | 19 | 5 |
| 100 | telnet | 19 | 3 |
EMPFEHLUNGEN
- •Deaktivieren Sie die Root-Anmeldung uber SSH
- •Verwenden Sie einzigartige und unvorhersehbare Benutzernamen
- •Implementieren Sie die Public-Key-Authentifizierung
- •Konfigurieren Sie fail2ban zum Blockieren von IPs