Airtell Router Scans, and Mislabeled usernames, (Wed, Aug 20th)

This post was originally published on this site

Looking at new usernames collected by our Cowrie honeypots, you will first of all notice a number of HTTP headers. It is very common for attackers to scan for web servers on ports that are covered by our Telnet honeypots. The result is that HTTP request headers end up in our username and password database. 

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.