As anyone who's put an EC2 up without securing it knows, an automated SSH attempt at 'root' will be made within a few hours of it coming online.
What I will take away from this, is that github provides a very nice authentication audit log. I really want every service/app/site to provide this kind of information.
This looks like bog standard background noise to me.
We've just added a kill-list of known decrypted passwords and English language words and forced people to reset their passwords who are listed in the adobe breach.
We wrote a script that hashed these passwords with the stored salt for each user and compared the result with the stored hashed value. Basically we brute forced everyone's accounts with the dictionary provided. Anyone who was found with an account that was in the dictionary was locked out with forced password change. We changed the password policy before doing this to increase complexity and block dictionary and the decrypted list words. We also force people to change their password every 28 days anyway and keep the last 7 hashed passwords and salts to verify that the user hasn't reused.
We store financial data so it's pretty hardcore auth requirements.
Of course I changed the password for github now.
I have 14 failed attempts in the last 4 days.