I run ssh through a VPN tunnel, so the attempts never show up 

I had been banning them, however it ended up turning into a problem because my 
drop rules list was getting huge and causing a performance problem.



On June 3, 2019 2:54:57 PM EDT, "Preston, Douglas via Fail2ban-users" 
<fail2ban-users@lists.sourceforge.net> wrote:
>I require keys for ssh, any invalid password attempt gets banned after
>1 
>try.
>
>On 6/2/2019 8:05 AM, Kenneth Porter wrote:
>> I've noticed that almost all the ssh attacks on my hosts are against 
>> usernames not remotely similar to legitimate users on my machine. 
>> They're mostly service names or the names of admin logins for
>routers.
>>
>> Is there some way to look for just those attempts, perhaps based on a
>
>> list of commonly-attacked usernames, and instantly ban them without 
>> waiting for retries? The logic I'd need is something that matches the
>
>> username against a list, perhaps loaded from a file.
>>
>>
>>
>>
>>
>> _______________________________________________
>> Fail2ban-users mailing list
>> Fail2ban-users@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/fail2ban-users
>
>
>_______________________________________________
>Fail2ban-users mailing list
>Fail2ban-users@lists.sourceforge.net
>https://lists.sourceforge.net/lists/listinfo/fail2ban-users
_______________________________________________
Fail2ban-users mailing list
Fail2ban-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to