Updated: décembre 2025

Top 100 Attacked SSH Usernames

Most used usernames in SSH brute force attacks. Avoid using predictable usernames.

#UsernameAttemptsIPs
1root5,919355
2sol1,72417
3admin1,085185
4solana98318
5ubuntu848154
6solv84215
7user597110
8test586108
9345gs5662d34520183
10oracle49052
11postgres44077
12mysql34450
13guest31744
14debian24243
15git23849
16hadoop20841
17pi18235
18ftpuser17466
19dev16955
20es16546
21developer15641
22node1459
23backup12814
24elastic12733
25docker12232
26dspace12123
27elasticsearch12043
28deploy11951
29zabbix9527
30centos9529
31www9333
32steam9242
33administrator9119
34ftp8929
35master8128
36nginx8034
37odoo7935
38tomcat7230
39daemon729
40testuser7054
41wang7022
42tom6823
43newuser6510
44ftptest658
45validator638
46apache6127
47jenkins6033
48app6035
49user15632
50rosa544
51support5412
52dolphinscheduler5222
53sa518
54nagios518
55sonar5123
56grid5021
57oscar4921
58raydium491
59minecraft4830
60ansible4729
61ubnt4727
62server4623
63gitlab4526
64ethereum446
65uftp4424
66bot4337
67operator426
68esuser4222
69deployer4131
70ec2-user4027
71svn407
72runner4031
73amir3918
74www-data3913
75weblogic3726
76bitrix3630
77test13612
78demo3426
79dmdba3314
80user23314
81firedancer324
82gpadmin3122
83nexus3123
84flink3125
85tools3122
86ranger3122
87User-Agent: Go-http-client/1.1304
88student2921
89redis2918
90webmaster296
91mapr282
92ps281
93trader283
94svn-cmu281
95test22825
96nvidia2719
97rancher2719
98gerrit273
99default2622
100cmu261

RECOMMENDATIONS

  • Disable root login via SSH
  • Use unique and unpredictable usernames
  • Implement public key authentication
  • Configure fail2ban to block IPs