Atualizado: fevereiro de 2026

Top 100 Usernames SSH Atacados

Os nomes de usuario mais utilizados em ataques de forca bruta SSH. Evite usar nomes de usuario previsiveis.

#UsernameTentativasIPs
1root8890535
2admin2517256
3sol179430
4ubuntu1639180
5solana156325
6user984155
7test849134
8postgres76095
9oracle66076
10solv59115
11guest44859
12mysql39250
13claude296241
14345gs5662d34284179
15git24961
16centos20427
17hadoop18433
18deploy18171
19validator17215
20administrator15447
21ftpuser15477
22debian15041
23backup14424
24node13921
25elastic12819
26minoxidil4you12026
27john11916
28www11830
29docker11718
30zabbix11716
31pi11424
32dev11351
33es11118
34developer10028
35support9625
36apache8921
37tomcat8519
38minecraft8242
39steam8038
40ftp7824
41jenkins7834
42ansible7521
43firedancer727
44test17122
45operator6811
46bot6525
47user16554
48gerrit655
49ftptest656
50master638
51elasticsearch6317
52nginx6217
53raydium626
54nagios5922
55dspace578
56ali5616
57a5621
58sysadmin5528
59trader545
60daemon537
61trading535
62lighthouse539
63search523
64ec2-user5215
65alex5219
66weblogic5223
67newuser527
68deployer5225
69slv481
70odoo16485
71testuser4833
72solnode421
73info4114
74sa4111
75ethereum396
76ps393
77svn385
78www-data385
79mapr383
80fedora377
81anonymous369
82server3630
83adam3611
84ubnt3511
85system3413
86admin13412
87jibs333
883d333
89app3218
90minima315
91ops317
92aaa3010
93redis277
94vagrant278
95webadmin2715
96ssh266
97mongodb266
98teamspeak2619
99Accept: */*261
100User-Agent: python-requests/2.27.1261

RECOMENDACOES

  • Desabilite o login de root via SSH
  • Use nomes de usuario unicos e imprevisiveis
  • Implemente autenticacao por chave publica
  • Configure fail2ban para bloquear IPs