Real-time SSH attack intelligence from distributed honeypot network
Simple newline-separated list of attacking IPs
IP addresses in CIDR notation (/32) for firewall rules
Ready-to-run bash script with iptables DROP rules
Detailed data including country, attempts, timestamps, usernames
Spreadsheet-compatible format with attack statistics
List of usernames attackers tried with attempt counts
Top 1000 passwords used in attacks (for defense research)
Full attack details: IP, country, username, password, timestamp