Over 60,000 attempted passwords
I configured a computer to open a service called Secure Shell (SSH) to the internet. Normally this is used by (unix) system administrators to log into a system remotely, but this wasn't a normal SSH service. The service I set up just logged the usernames and passwords attackers would try to connect with and deny all access. This simple interactive visualization shows the sources of the attacks and the username/passwords they attempted to log into the service with.