Protect SSH Server from Brute Force Attack | AEM Community Blog Seeding

Avatar

Avatar
Establish
Community Manager
kautuk_sahni
Community Manager

Likes

1,201 likes

Total Posts

6,395 posts

Correct reply

1,147 solutions
Top badges earned
Establish
Coach
Originator
Contributor 2
Contributor
View profile

Avatar
Establish
Community Manager
kautuk_sahni
Community Manager

Likes

1,201 likes

Total Posts

6,395 posts

Correct reply

1,147 solutions
Top badges earned
Establish
Coach
Originator
Contributor 2
Contributor
View profile
kautuk_sahni
Community Manager

21-05-2020

BlogImage.jpg

Protect SSH Server from Brute Force Attack by aem4beginner Blog

Abstract

Protect SSH Server from Brute Force Attack
Other than remote login, there are various useful things you can do with ssh, like running a remote command, multiplexing connections to save on server resources, setting up ssh aliases to save you some keystrokes, and so forth.

Recently, when my partner logged on a recently created CentOS server hosted at Digital Ocean, he saw the following messages:
Last failed login: Tue Jul 29 16:27:31 EDT 2014 from stuff2share.net on ssh:notty

There were 20 failed login attempts since the last successful login
Clearly that wasn't us trying to log in. Obviously, there was some malicious user(s) likely trying to enter our server with brute-force attacks. We were under a ssh brute force attack. Such malicious scan is not uncommon these days. It came just a couple days after our new server was up.

Read Full Blog

Protect SSH Server from Brute Force Attack

Q&A

Please use this thread to ask the related questions.