Opendatabay APP

Raspberry Pi SSH Intrusion Logs

Data Science and Analytics

Tags and Keywords

Ssh

Cybersecurity

Intrusion

Brute-force

Raspberrypi

Trusted By
Trusted by company1Trusted by company2Trusted by company3
Raspberry Pi SSH Intrusion Logs Dataset on Opendatabay data marketplace

"No reviews yet"

Free

About

Recording over 173,000 failed authentication attempts, this dataset captures intrusion logs from a Raspberry Pi exposed to the internet. It provides a granular look at SSH brute force attacks, detailing the origins, timing, and credentials used by automated bots and malicious actors. The logs serve as a valuable resource for cybersecurity professionals and enthusiasts aiming to analyse attack patterns, identify common botnet behaviours, and understand the prevalence of specific usernames and ports in unauthorised access attempts.

Columns

  • Month: The month in which the login attempt occurred (primarily February and March).
  • DayOftheMonth: The specific day of the month for the recorded attempt.
  • Time: The timestamp indicating the precise hour and minute of the login attempt.
  • Username: The username attempted by the intruder (e.g., 'root', 'user').
  • IPAddress: The source IP address from which the connection attempt originated.
  • Port: The destination port targeted during the intrusion attempt.

Distribution

  • Format: CSV
  • Size: 7.39 MB
  • Structure: 173,000 rows (records)
  • Data Validity: 100% valid records with no missing values in primary columns.

Usage

  • Cybersecurity Analysis: Investigating brute-force attack strategies and credential dictionary usage.
  • Network Defence: Identifying malicious IP addresses for blacklist generation.
  • Botnet Tracking: Analysing peak activity times to determine botnet scheduling and origins.
  • Data Visualisation: Creating heatmaps of attack times or geographic sources of intrusion.
  • Port Scanning Research: Examining which non-standard ports are targeted alongside standard SSH ports.

Coverage

  • Geographic Scope: Global (contains source IP addresses from various locations).
  • Time Range: Data reflects activity recorded during February and March (specifically 2022).
  • Demographic Scope: Non-human actors (automated bots and scripts).
  • Note: While the original description notes potential ambiguity regarding exact dates, the data files contain precise timestamps and date markers for the captured window.

License

CC0: Public Domain

Who Can Use It

  • Cybersecurity Researchers: For threat intelligence and pattern recognition.
  • System Administrators: To understand common vulnerabilities and improve server hardening.
  • Data Analysts: Practising forensic data analysis and visualisation techniques on real-world logs.
  • Students: Learning about network security and intrusion detection systems.

Dataset Name Suggestions

  • Raspberry Pi SSH Intrusion Logs
  • Brute Force Authentication Attempts 2022
  • Cybersecurity: Failed SSH Login Dataset
  • IoT Botnet Attack Logs

Attributes

Original Data Source: Raspberry Pi SSH Intrusion Logs

Listing Stats

VIEWS

1

DOWNLOADS

0

LISTED

03/12/2025

REGION

GLOBAL

Universal Data Quality Score Logo UDQSQUALITY

5 / 5

VERSION

1.0

Loading...

Free

Download Dataset in CSV Format