Updated: February 2026

Top 100 Attacked SSH Usernames

Most used usernames in SSH brute force attacks. Avoid using predictable usernames.

#UsernameAttemptsIPs
1root5905671
2sol201931
3ubuntu1698307
4solana166531
5admin1236321
6odoo168967
7345gs5662d34856515
8user66972
9solv65618
10n8n390184
11exx312183
12socks284211
13postgres23432
14test22946
15claude200163
16validator19616
17cheeki178121
18supervisor1709
19guest15727
20node15420
21ftpuser13627
22git12074
23pi11716
24ftp10917
25minoxidil4you10121
26oracle9826
27elemental9567
28firedancer868
29deploy8517
30support8019
31bot7324
32raydium716
33mysql7020
34centos6714
35ethereum6611
36ubnt6315
37lighthouse623
38trader6010
39trading565
40solnode541
41jenkins5122
42anonymous5117
43deployer5019
44slv481
45a4717
46mapr473
47debian4628
48operator4611
49ali4427
50student4414
51sa447
52odoo4415
53alex4317
54ec2-user439
55steam4318
56ps424
57www4212
58system4112
59nginx415
60admin14110
61user14021
62demo3719
63minima376
643d363
65testuser3618
66dev3515
67jibs353
68banx352
69kafka347
70minecraft339
71devuser3224
72ops308
73latitude302
74eth295
75es2910
76Admin285
77gitlab-runner2821
78aaa289
79sammy2823
80web2812
81helius271
82solscript271
83username2723
84ftptest2716
85soldev271
86botuser2617
87soltech261
88frappe2623
89jito264
90tunnel2419
91cexadmin241
92psadmin242
93cexuser241
94testing2420
95opadmin242
96operation242
97ts2213
98sftpuser2218
99tomcat225
100ftpadmin2215

RECOMMENDATIONS

  • Disable root login via SSH
  • Use unique and unpredictable usernames
  • Implement public key authentication
  • Configure fail2ban to block IPs