CentralMail Logo Attack Intelligence

Real-Time SSH Brute Force & Intrusion Detection Platform

Professional SSH Attack Intelligence Platform

Welcome to CentralMail's advanced SSH intrusion detection and threat intelligence system. This platform operates a sophisticated honeypot network monitoring SSH attack attempts in real-time from sources worldwide.

Our multi-vector detection system includes:

  • SSH Honeypot Monitoring: Distributed honeypot servers capturing unauthorized login attempts and credential stuffing attacks
  • Brute Force Detection: Real-time identification of automated password guessing attacks against SSH services
  • Dictionary Attack Analysis: Tracking common username/password combinations used by attackers
  • Geographic Intelligence: IP geolocation tracking identifying attack origins by country with threat correlation
  • Behavioral Analysis: Automated threat level assessment based on attack frequency, username patterns, and attack vectors

All collected intelligence is processed through our proprietary multi-stage analysis engine, which automatically categorizes threats by severity level, geographic origin, and behavioral patterns. Our sophisticated scoring algorithms evaluate each attack source across multiple dimensions including attack frequency, targeted usernames, and historical patterns. This comprehensive analysis is then made available through continuously updated blacklists distributed in multiple formats for seamless integration with various firewall and security platforms.

Our honeypot network operates in real-time streaming mode, with all attack attempts immediately logged and analyzed. Attack data is processed with zero latency, ensuring newly identified threat sources are flagged within seconds of detection. For operational consistency and automated scheduled updates, all IP addresses from across our distributed monitoring infrastructure are consolidated into unified master blacklists daily at 0200 UTC.

⚠️ TOP THREATS

Most Active IP
193.110.157.47
πŸ”₯ 9,565 attempts N/A
Highest Origin
GR
πŸ“ 107,779 attacks
Latest Attack
213.209.159.159
PT DICTIONARY
⏱️ 19:58:18
Updated: 19:58:18 UTC
387,357 Total Attacks
1,969 Unique IPs
85,890 Today
387,359 This Week
387,360 This Month
480 Critical
412 High
432 Medium
217,853 Brute Force
169,318 Dictionary
1,578 Blocked IPs
4,447 Attacked Users

πŸ“₯ Download Current Blacklists Real-Time Updates

AbuseIPDB Contributor Badge

🚫 SSH Attack IP Stream 1,578 ip's Confirmed attackers πŸ‘€ Targeted Usernames 4,447 users Attacked accounts πŸ“Š Consolidated Daily List 10,003 ip's Updates at 0200 UTC every day πŸ”‘ Common Passwords 5 entries Attack password patterns

Implementation Guide

iptables/firewall Integration:

  • Download ssh-ips.txt
  • Add to iptables: iptables -I INPUT -s [IP] -j DROP
  • Or use ipset for bulk blocking: ipset create ssh_blacklist hash:ip

fail2ban Integration:

  • Add custom filter in /etc/fail2ban/filter.d/
  • Configure action to check against blacklist
  • Enable jail in jail.local

Automated Updates: Set up cron job to download lists every 15 minutes for maximum protection

Check IP Status

πŸ“Š 24-Hour Attack Activity Analysis

106,117
TOTAL ATTACKS
5,516
PEAK HOUR
4421.5
AVG PER HOUR
24
ACTIVE HOURS
Critical High Medium Low Trend Line