The original post: /r/netsec by /u/cydan99 on 2024-08-11 07:26:54.

TL;DR I deployed canary tokens in various public places on the Internet, logged all access attempts, and discovered intriguing patterns on credential discovery and attack methodologies of threat actors.