Updated: December 2025

Top 100 Attacked SSH Usernames

Most used usernames in SSH brute force attacks. Avoid using predictable usernames.

#UsernameAttemptsIPs
1root5,761333
2sol1,71316
3admin1,178203
4solana96117
5solv85415
6ubuntu786126
7test649105
8user630109
9oracle50660
10postgres48677
11345gs5662d34430158
12mysql38257
13guest30446
14git24755
15pi21839
16debian21237
17hadoop19441
18ftpuser16762
19dev14846
20es13933
21node1388
22deploy13055
23developer12336
24elastic11332
25elasticsearch10840
26centos10530
27backup10513
28dspace10224
29nginx9936
30www9734
31docker9430
32ftp9335
33administrator9019
34steam8531
35wang7826
36tom7525
37odoo7427
38zabbix7327
39testuser7152
40apache6930
41newuser6611
42daemon639
43user16132
44validator617
45master6026
46support6013
47tomcat6031
48rosa585
49sonar5824
50dolphinscheduler5822
51oscar5521
52app5529
53uftp5327
54sa519
55grid4920
56server4925
57esuser4922
58gitlab4820
59ubnt4630
60minecraft4525
61raydium451
62deployer4532
63weblogic4328
64ftptest426
65ethereum426
66svn427
67demo4230
68ec2-user4027
69amir3916
70www-data3913
71jenkins3928
72plex3724
73nagios368
74dmdba3616
75bitrix3529
76flink3525
77ranger3522
78nexus3523
79flask3510
80runner3424
81bot3428
82vagrant3424
83tools3422
84gpadmin3322
85user23313
86ts3325
87rancher3221
88ansible3225
89webmaster316
90firedancer313
91redis3018
92User-Agent: Go-http-client/1.1304
93nvidia3020
94default2924
95ps291
96test22824
97mapr282
98student2819
99mongodb2811
100svn-cmu271

RECOMMENDATIONS

  • Disable root login via SSH
  • Use unique and unpredictable usernames
  • Implement public key authentication
  • Configure fail2ban to block IPs