CentralMail Logo Attack Intelligence

Real-Time SSH Brute Force & Intrusion Detection Platform

Professional SSH Attack Intelligence Platform

Welcome to CentralMail's advanced SSH intrusion detection and threat intelligence system. This platform operates a sophisticated honeypot network monitoring SSH attack attempts in real-time from sources worldwide.

Our multi-vector detection system includes:

  • SSH Honeypot Monitoring: Distributed honeypot servers capturing unauthorized login attempts and credential stuffing attacks
  • Brute Force Detection: Real-time identification of automated password guessing attacks against SSH services
  • Dictionary Attack Analysis: Tracking common username/password combinations used by attackers
  • Geographic Intelligence: IP geolocation tracking identifying attack origins by country with threat correlation
  • Behavioral Analysis: Automated threat level assessment based on attack frequency, username patterns, and attack vectors

All collected intelligence is processed through our proprietary multi-stage analysis engine, which automatically categorizes threats by severity level, geographic origin, and behavioral patterns. Our sophisticated scoring algorithms evaluate each attack source across multiple dimensions including attack frequency, targeted usernames, and historical patterns. This comprehensive analysis is then made available through continuously updated blacklists distributed in multiple formats for seamless integration with various firewall and security platforms.

Our honeypot network operates in real-time streaming mode, with all attack attempts immediately logged and analyzed. Attack data is processed with zero latency, ensuring newly identified threat sources are flagged within seconds of detection. For operational consistency and automated scheduled updates, all IP addresses from across our distributed monitoring infrastructure are consolidated into unified master blacklists daily at 0200 UTC.

⚠️ TOP THREATS

Most Active IP
193.110.157.47
πŸ”₯ 5,343 attempts N/A
Highest Origin
GR
πŸ“ 59,926 attacks
Latest Attack
92.118.39.83
GR DICTIONARY
⏱️ 21:13:21
Updated: 21:13:21 UTC
199,163 Total Attacks
1,356 Unique IPs
68,172 Today
199,162 This Week
199,162 This Month
185 Critical
213 High
441 Medium
113,421 Brute Force
85,550 Dictionary
1,108 Blocked IPs
3,455 Attacked Users

πŸ“₯ Download Current Blacklists Real-Time Updates

AbuseIPDB Contributor Badge

🚫 SSH Attack IP Stream 1,108 ip's Confirmed attackers πŸ‘€ Targeted Usernames 3,455 users Attacked accounts πŸ“Š Consolidated Daily List 10,003 ip's Updates at 0200 UTC every day πŸ”‘ Common Passwords 5 entries Attack password patterns

Implementation Guide

iptables/firewall Integration:

  • Download ssh-ips.txt
  • Add to iptables: iptables -I INPUT -s [IP] -j DROP
  • Or use ipset for bulk blocking: ipset create ssh_blacklist hash:ip

fail2ban Integration:

  • Add custom filter in /etc/fail2ban/filter.d/
  • Configure action to check against blacklist
  • Enable jail in jail.local

Automated Updates: Set up cron job to download lists every 15 minutes for maximum protection

Check IP Status

πŸ“Š 24-Hour Attack Activity Analysis

76,427
TOTAL ATTACKS
4,720
PEAK HOUR
3184.5
AVG PER HOUR
24
ACTIVE HOURS
Critical High Medium Low Trend Line