This is the attacker tools used for the SSH bruter.
Case: http://blog.malwaremustdie.org/2014/05/a-payback-to-ssh-bruting-crooks.html
Attack log snips:
https://www.youtube.com/watch?v=XVf_jriRyCE
Statistic of recorded attacker relay IP with graph:
http://malwaremustdie.org/stat/ipbrute.html
List of attacker IP in 2 weeks periods:
http://pastebin.com/raw.php?i=TMGgTbGq
#MalwareMustDie | malwaremustdie.org
آی-ویدئو