Attackers use search engines to scan for exposed SSH ports and leaked...
https://dibz.me/blog/what-is-search-exposure-how-your-digital-footprint-becomes-a-roadmap-for-attackers-1072
Attackers use search engines to scan for exposed SSH ports and leaked credentials on GitHub or data broker sites. If your infrastructure shows up in these public indexes, you hand hackers a roadmap for your network