SSH Brute Force Attacks — Last 24 Hours
SSH brute force attacks attempt to gain unauthorized access to servers by systematically trying username and password combinations against the SSH service (port 22). These attacks are among the most common threats facing internet-connected servers. The table below shows IP addresses flagged for SSH brute force activity in the past 24 hours, sourced from our network of fail2ban reporters and threat intelligence feeds.
No SSH brute force attacks detected in the last 24 hours from our reporter network.
How to Protect Against SSH Brute Force
SSH brute force attacks can be mitigated with several proven strategies:
- Use key-based authentication instead of passwords
- Install and configure fail2ban to automatically block attackers
- Change SSH to a non-standard port
- Use firewall rules to restrict SSH access to known IP ranges
- Enable rate limiting on your SSH server
For a detailed guide, see our SSH Brute Force Attack Explainer.