CentralMail Logo Attack Intelligence

Real-Time SSH Brute Force & Intrusion Detection Platform

Professional SSH Attack Intelligence Platform

Welcome to CentralMail's advanced SSH intrusion detection and threat intelligence system. This platform operates a sophisticated honeypot network monitoring SSH attack attempts in real-time from sources worldwide.

Our multi-vector detection system includes:

  • SSH Honeypot Monitoring: Distributed honeypot servers capturing unauthorized login attempts and credential stuffing attacks
  • Brute Force Detection: Real-time identification of automated password guessing attacks against SSH services
  • Dictionary Attack Analysis: Tracking common username/password combinations used by attackers
  • Geographic Intelligence: IP geolocation tracking identifying attack origins by country with threat correlation
  • Behavioral Analysis: Automated threat level assessment based on attack frequency, username patterns, and attack vectors

All collected intelligence is processed through our proprietary multi-stage analysis engine, which automatically categorizes threats by severity level, geographic origin, and behavioral patterns. Our sophisticated scoring algorithms evaluate each attack source across multiple dimensions including attack frequency, targeted usernames, and historical patterns. This comprehensive analysis is then made available through continuously updated blacklists distributed in multiple formats for seamless integration with various firewall and security platforms.

Our honeypot network operates in real-time streaming mode, with all attack attempts immediately logged and analyzed. Attack data is processed with zero latency, ensuring newly identified threat sources are flagged within seconds of detection. For operational consistency and automated scheduled updates, all IP addresses from across our distributed monitoring infrastructure are consolidated into unified master blacklists daily at 0200 UTC.

⚠️ TOP THREATS

Most Active IP
92.118.39.84
πŸ”₯ 1,455 attempts N/A
Highest Origin
GR
πŸ“ 13,940 attacks
Latest Attack
167.179.19.182
NZ DICTIONARY
⏱️ 23:17:58
Updated: 23:17:58 UTC
44,120 Total Attacks
437 Unique IPs
44,119 Today
44,119 This Week
44,119 This Month
57 Critical
61 High
126 Medium
23,177 Brute Force
20,751 Dictionary
361 Blocked IPs
1,212 Attacked Users

πŸ“₯ Download Current Blacklists Real-Time Updates

AbuseIPDB Contributor Badge

🚫 SSH Attack IP Stream 361 ip's Confirmed attackers πŸ‘€ Targeted Usernames 1,212 users Attacked accounts πŸ“Š Consolidated Daily List 0 ip's Updates at 0200 UTC every day πŸ”‘ Common Passwords 0 entries Attack password patterns

Implementation Guide

iptables/firewall Integration:

  • Download ssh-ips.txt
  • Add to iptables: iptables -I INPUT -s [IP] -j DROP
  • Or use ipset for bulk blocking: ipset create ssh_blacklist hash:ip

fail2ban Integration:

  • Add custom filter in /etc/fail2ban/filter.d/
  • Configure action to check against blacklist
  • Enable jail in jail.local

Automated Updates: Set up cron job to download lists every 15 minutes for maximum protection

Check IP Status

πŸ“Š 24-Hour Attack Activity Analysis

44,119
TOTAL ATTACKS
4,481
PEAK HOUR
1838.3
AVG PER HOUR
16
ACTIVE HOURS
Critical High Medium Low Trend Line