CentralMail Logo Attack Intelligence

Real-Time SSH Brute Force & Intrusion Detection Platform

Professional SSH Attack Intelligence Platform

Welcome to CentralMail's advanced SSH intrusion detection and threat intelligence system. This platform operates a sophisticated honeypot network monitoring SSH attack attempts in real-time from sources worldwide.

Our multi-vector detection system includes:

  • SSH Honeypot Monitoring: Distributed honeypot servers capturing unauthorized login attempts and credential stuffing attacks
  • Brute Force Detection: Real-time identification of automated password guessing attacks against SSH services
  • Dictionary Attack Analysis: Tracking common username/password combinations used by attackers
  • Geographic Intelligence: IP geolocation tracking identifying attack origins by country with threat correlation
  • Behavioral Analysis: Automated threat level assessment based on attack frequency, username patterns, and attack vectors

All collected intelligence is processed through our proprietary multi-stage analysis engine, which automatically categorizes threats by severity level, geographic origin, and behavioral patterns. Our sophisticated scoring algorithms evaluate each attack source across multiple dimensions including attack frequency, targeted usernames, and historical patterns. This comprehensive analysis is then made available through continuously updated blacklists distributed in multiple formats for seamless integration with various firewall and security platforms.

Our honeypot network operates in real-time streaming mode, with all attack attempts immediately logged and analyzed. Attack data is processed with zero latency, ensuring newly identified threat sources are flagged within seconds of detection. For operational consistency and automated scheduled updates, all IP addresses from across our distributed monitoring infrastructure are consolidated into unified master blacklists daily at 0200 UTC.

⚠️ TOP THREATS

Most Active IP
92.118.39.83
πŸ”₯ 1,548 attempts N/A
Highest Origin
GR
πŸ“ 15,011 attacks
Latest Attack
92.118.39.34
GR DICTIONARY
⏱️ 00:16:26
Updated: 00:16:27 UTC
46,888 Total Attacks
445 Unique IPs
773 Today
46,887 This Week
46,887 This Month
58 Critical
60 High
128 Medium
24,643 Brute Force
22,053 Dictionary
365 Blocked IPs
1,223 Attacked Users

πŸ“₯ Download Current Blacklists Real-Time Updates

AbuseIPDB Contributor Badge

🚫 SSH Attack IP Stream 365 ip's Confirmed attackers πŸ‘€ Targeted Usernames 1,223 users Attacked accounts πŸ“Š Consolidated Daily List 0 ip's Updates at 0200 UTC every day πŸ”‘ Common Passwords 0 entries Attack password patterns

Implementation Guide

iptables/firewall Integration:

  • Download ssh-ips.txt
  • Add to iptables: iptables -I INPUT -s [IP] -j DROP
  • Or use ipset for bulk blocking: ipset create ssh_blacklist hash:ip

fail2ban Integration:

  • Add custom filter in /etc/fail2ban/filter.d/
  • Configure action to check against blacklist
  • Enable jail in jail.local

Automated Updates: Set up cron job to download lists every 15 minutes for maximum protection

Check IP Status

πŸ“Š 24-Hour Attack Activity Analysis

46,887
TOTAL ATTACKS
4,481
PEAK HOUR
1953.6
AVG PER HOUR
17
ACTIVE HOURS
Critical High Medium Low Trend Line