12-14-2018, 06:37 PM
not excessive at all. that is very common. the are so many bad actors out there scanning for vulnerable services. those are from autobots.. lol
also there might be some good people or effort among those. May be trying to make a complete map of everything going on in the netspace.
Server to servers. so i guess VPSs. but then it is not a logic class. it is a living breathing language we are talking about ( gut, nut, cut, but put). also English is not my mother tongue. still I'm fairly certain it is so. i read somewhere.
big and long and mixed password is the key here. also please use rate limiting in some form. like say 5 failed login attempt from an ip within 3 minute bans it for a day or something.
other good measures would be -
1) change the ssh port.
2) check and confirm the default setting of root not being able to login using password is there.
3) configure login using certificates.
also there might be some good people or effort among those. May be trying to make a complete map of everything going on in the netspace.
Server to servers. so i guess VPSs. but then it is not a logic class. it is a living breathing language we are talking about ( gut, nut, cut, but put). also English is not my mother tongue. still I'm fairly certain it is so. i read somewhere.
big and long and mixed password is the key here. also please use rate limiting in some form. like say 5 failed login attempt from an ip within 3 minute bans it for a day or something.
other good measures would be -
1) change the ssh port.
2) check and confirm the default setting of root not being able to login using password is there.
3) configure login using certificates.
Sincere Thanks to VirMach for my VPS9. Also many thanks to Shadow Hosting and cubedata for the experiences I had with their VPSs.