May 11, 2024, 1:17 a.m. | Programmer Raja

DEV Community dev.to

As the sun set on a typical Saturday evening, I found myself engrossed in a blog titled "Visualizing Malicious IP Addresses." The author shared clever ways to detect unauthorized attempts to access virtual machines via SSH, using commands like:



$ journalctl --since "-1d" -u sshd | grep "Failed password" | wc -l
$ journalctl --since "-1d" -u sshd | grep "Failed publickey" | wc -l


Curious, I decided to try these commands on our own VM. To my …

access addresses author blog cloudcomputing commands detect found hacking ip addresses journey machines malicious password ssh sshd threats unauthorized virtual virtual machines visualizing webdev

Sr. Product Manager

@ MixMode | Remote, US

Information Security Engineers

@ D. E. Shaw Research | New York City

Assoc/Mid ET P&C Control System Field Compliance Analyst (Glen Allen, VA)

@ Dominion Energy | GLEN ALLEN, VA, US, 23060

Technology Risk & Controls Lead- PCI Compliance

@ JPMorgan Chase & Co. | Plano, TX, United States

Editor, Compliance Risk and Diligence

@ Kroll | Manila, Philippines

KGS - KDN IAM Associate Consultant - Bengaluru

@ KPMG India | Bengaluru, Karnataka, India