This page displays login attempts flagged as anomalies using a machine learning model called Isolation Forest. The Isolation Forest model identifies unusual login patterns by looking for data points that differ significantly from the majority. It uses four key features from the login data to detect anomalies:
If a login attempt looks very different from typical patterns (such as occurring at an odd hour or having too many failed attempts), it is flagged as an anomaly. The following table shows these flagged attempts, updated every 5 minutes.
Username | Password | Success | Source IP | Hour | Day of Week | Failed Attempts | Success Ratio | Anomaly |
---|---|---|---|---|---|---|---|---|
root | yueme123!!! | 0 | 193.124.190.242 | 0 | 2 | 3 | 0.0 | -1 |
root | qwerasdf1234 | 0 | 171.247.254.249 | 0 | 2 | 1 | 0.0 | -1 |
root | yueme2018!!! | 0 | 193.124.190.242 | 0 | 2 | 3 | 0.0 | -1 |
root | 123456A | 0 | 120.48.74.47 | 0 | 2 | 1 | 0.0 | -1 |
root | yueme2019!!! | 0 | 193.124.190.242 | 0 | 2 | 3 | 0.0 | -1 |
admin | 00000 | 0 | 141.95.162.162 | 0 | 2 | 1 | 0.0 | -1 |