Unauthorized SSH access attempts from the Internet – How companies can protect themselves
The attacks are often automated and hardly noticeable — frequently occurring in very short intervals, even before anyone notices the incident. A particularly frequently exploited gateway is the SSH service: The protocol itself is intended for secure administration, but exposed or poorly configured SSH servers are routinely attacked by scanners
