<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">

Learn how GoScanSSH and Prowli attack enterprise servers

Cyber security strategist Craig Riddell, from SSH.COM, inventors of the Secure Shell (SSH) protocol, takes a detailed look at new attack vectors targeting public SSH servers in the GoScanSSH Threat Research Paper.

Using sophisticated monitoring and SSH.COM CryptoAuditor® we tracked bot activity and authentication hacking attempts to uncover the truth about GoScanSSH and hackers' methods and targets.

Fill the form now to get the GoScanSSH PDF...

Get the threat research paper

In the GoScanSSH Threat Research Paper you will learn about:

  • How GoScanSSH and Prowli target enterprise and government SSH servers
  • Tracking and analysis of bots' attempted SSH connections
  • How to adopt best practices to eliminate the threat from crypto mining malware

“We wanted to dive deeper… by creating an impromptu honey pot… as you can see, the number of attacks on a public-facing SSH server are staggering…”

Find out more about how unique CryptoAuditor software monitors and controls encrypted traffic

Learn about CryptoAuditor