Attackers use search engines to scan for exposed SSH ports and leaked...
https://weekly-wiki.win/index.php/Why_Search_Exposure_Is_More_Than_Just_a_Privacy_Issue
Attackers use search engines to scan for exposed SSH ports and leaked credentials on GitHub or data broker sites. If your infrastructure shows up in these public indexes, you hand hackers a roadmap for your network