CentralMail Logo Attack Intelligence

Real-Time SSH Brute Force & Intrusion Detection Platform

Professional SSH Attack Intelligence Platform

Welcome to CentralMail's advanced SSH intrusion detection and threat intelligence system. This platform operates a sophisticated honeypot network monitoring SSH attack attempts in real-time from sources worldwide.

Our multi-vector detection system includes:

  • SSH Honeypot Monitoring: Distributed honeypot servers capturing unauthorized login attempts and credential stuffing attacks
  • Brute Force Detection: Real-time identification of automated password guessing attacks against SSH services
  • Dictionary Attack Analysis: Tracking common username/password combinations used by attackers
  • Geographic Intelligence: IP geolocation tracking identifying attack origins by country with threat correlation
  • Behavioral Analysis: Automated threat level assessment based on attack frequency, username patterns, and attack vectors

All collected intelligence is processed through our proprietary multi-stage analysis engine, which automatically categorizes threats by severity level, geographic origin, and behavioral patterns. Our sophisticated scoring algorithms evaluate each attack source across multiple dimensions including attack frequency, targeted usernames, and historical patterns. This comprehensive analysis is then made available through continuously updated blacklists distributed in multiple formats for seamless integration with various firewall and security platforms.

Our honeypot network operates in real-time streaming mode, with all attack attempts immediately logged and analyzed. Attack data is processed with zero latency, ensuring newly identified threat sources are flagged within seconds of detection. For operational consistency and automated scheduled updates, all IP addresses from across our distributed monitoring infrastructure are consolidated into unified master blacklists daily at 0200 UTC.

⚠️ TOP THREATS

Most Active IP
138.197.93.7
πŸ”₯ 18,152 attempts US
Highest Origin
US
πŸ“ 164,345 attacks
Latest Attack
115.190.216.185
CN BRUTE_FORCE
⏱️ 21:10:14
Updated: 21:10:19 UTC
942,621 Total Attacks
6,709 Unique IPs
14,836 Today
109,928 This Week
743,620 This Month
732 Critical
549 High
703 Medium
686,175 Brute Force
256,255 Dictionary
2,457 Blocked IPs
8,031 Attacked Users

πŸ“₯ Download Current Blacklists Real-Time Updates

AbuseIPDB Contributor Badge

🚫 SSH Attack IP Stream 2,457 ip's Confirmed attackers πŸ‘€ Targeted Usernames 8,031 users Attacked accounts πŸ“Š Consolidated Daily List 10,003 ip's Updates at 0200 UTC every day πŸ”‘ Common Passwords 5 entries Attack password patterns

Implementation Guide

iptables/firewall Integration:

  • Download ssh-ips.txt
  • Add to iptables: iptables -I INPUT -s [IP] -j DROP
  • Or use ipset for bulk blocking: ipset create ssh_blacklist hash:ip

fail2ban Integration:

  • Add custom filter in /etc/fail2ban/filter.d/
  • Configure action to check against blacklist
  • Enable jail in jail.local

Automated Updates: Set up cron job to download lists every 15 minutes for maximum protection

Check IP Status

πŸ“Š 24-Hour Attack Activity Analysis

17,235
TOTAL ATTACKS
884
PEAK HOUR
718.1
AVG PER HOUR
24
ACTIVE HOURS
Critical High Medium Low Trend Line