SSH Brute Force Attacks — Last 24 Hours

SSH brute force attacks attempt to gain unauthorized access to servers by systematically trying username and password combinations against the SSH service (port 22). These attacks are among the most common threats facing internet-connected servers. The table below shows IP addresses flagged for SSH brute force activity in the past 24 hours, sourced from our network of fail2ban reporters and threat intelligence feeds.

No SSH brute force attacks detected in the last 24 hours from our reporter network.

How to Protect Against SSH Brute Force

SSH brute force attacks can be mitigated with several proven strategies:

  • Use key-based authentication instead of passwords
  • Install and configure fail2ban to automatically block attackers
  • Change SSH to a non-standard port
  • Use firewall rules to restrict SSH access to known IP ranges
  • Enable rate limiting on your SSH server

For a detailed guide, see our SSH Brute Force Attack Explainer.

SSH Attack Explainer All Top Threats Botnet C2 IPs Malware Hosting How to Block IPs