SSH Brute Force / Spray Detection Report

Log: auth_demo.log
Time range: 2025-12-12 17:10:03 → 2025-12-12 18:06:43
Last 60 minutes

Executive Summary

Scope & Metrics

Flagged Findings

IPTechniqueSeverityFailsBurstFirstLastGeoOrg
45.33.12.101burst_bruteforceHigh Medium15152025-12-12 18:06:012025-12-12 18:06:43Richardson, Texas, USAS63949 Akamai Connected Cloud

Observed Activity

IPTechniqueSeverityFailsBurstFirstLastGeoOrg
185.199.110.32slow_spray_or_scanInformational Low612025-12-12 17:10:032025-12-12 18:00:03San Francisco, California, USAS54113 Fastly, Inc.
73.22.44.18low_signalInformational Low222025-12-12 18:04:202025-12-12 18:04:32(Residential) USUnknown ASN (demo)

Evidence & Recommended Actions

Flagged Source: 45.33.12.101

Technique: burst_bruteforce
Severity: High (Medium)
Total failures: 15
Observed: 2025-12-12 18:06:01 → 2025-12-12 18:06:43

Dec 12 18:06:01 ip-10-0-0-5 sshd[1310]: Failed password for invalid user admin from 45.33.12.101 port 51310 ssh2
Dec 12 18:06:04 ip-10-0-0-5 sshd[1311]: Failed password for invalid user admin from 45.33.12.101 port 51311 ssh2
Dec 12 18:06:07 ip-10-0-0-5 sshd[1312]: Failed password for invalid user admin from 45.33.12.101 port 51312 ssh2
Dec 12 18:06:10 ip-10-0-0-5 sshd[1313]: Failed password for invalid user admin from 45.33.12.101 port 51313 ssh2
Dec 12 18:06:13 ip-10-0-0-5 sshd[1314]: Failed password for invalid user admin from 45.33.12.101 port 51314 ssh2
Dec 12 18:06:16 ip-10-0-0-5 sshd[1315]: Failed password for invalid user admin from 45.33.12.101 port 51315 ssh2
Dec 12 18:06:19 ip-10-0-0-5 sshd[1316]: Failed password for invalid user admin from 45.33.12.101 port 51316 ssh2
Dec 12 18:06:22 ip-10-0-0-5 sshd[1317]: Failed password for invalid user admin from 45.33.12.101 port 51317 ssh2

Recommended Actions

This report is based on failed SSH authentication logs only and is intended for incident triage and control validation.