06-30-2018, 02:13 PM
@deanhills
It absolutely doesn't matter which one you pick from this range. Automated bruteforce bots are only after default ports either way. Human hackers as said before will run a tool like nmap to scan for all open ports and will find out your SSH port anyway.
When someone uses nmap to scan all ports to find SSH ports the output would look like something below:
Modified output to represent a SSH server running on a different port.
Original sample output taken from: https://thoughtsbyclayg.blogspot.com/200...rs-on.html
It absolutely doesn't matter which one you pick from this range. Automated bruteforce bots are only after default ports either way. Human hackers as said before will run a tool like nmap to scan for all open ports and will find out your SSH port anyway.
When someone uses nmap to scan all ports to find SSH ports the output would look like something below:
Code: (Select All)
Interesting ports on [ipaddressremoved]:
PORT STATE SERVICE VERSION
42500/tcp open ssh OpenSSH 4.7p1 Debian 8ubuntu1.2 (protocol 2.0)
MAC Address: [macaddressremoved] (Intel)
Service Info: OS: Linux
Original sample output taken from: https://thoughtsbyclayg.blogspot.com/200...rs-on.html