216,000+ customers in over 135 countries grow their businesses with HubSpot
HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
Get started free
Auth0 Free: 25K MAUs + 5-Min Setup
Enterprise Auth, Zero Friction: Any Framework • 30+ SDKs • Universal Login
Production-ready login in 10 lines of code. SSO, MFA & social auth included. Scale seamlessly beyond free tier with Okta’s enterprise security.
Intelligently block brute-force attacks by aggregating system logs
SSHGuard protects hosts from brute-force attacks against SSH and other services. It aggregates system logs and blocks repeat offenders using several firewall backends, including iptables, ipfw, and pf.
AutoBahn is a reactive unix log monitor, capable of analyzing logs for suspicious activity and implementing firewall rules to block offenders, all in real-time.
Panoptis plans to create a network security tool (N-IDS) to detect and block DoS and DDoS attacks. The programming language is C++, and the input is being provided by routers.
Bruteblock allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attacker's IP into IPFW table effectively blocking them. Addresses are removed from the table after expiration period
Trusted by nearly 20,000 customers worldwide, and all major cloud providers.
OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
A HTTP-Proxy (TCP-Forwarder) which allows to
measure and block (filter) Internet Access for Stations or Rooms
online on a PHP-Page.
Designed, recommended and used for classrooms with public internet access.
It is neccesary to have a Privacy-Agreement
A Small Perl script that monitors possibly hostile sshd login attempts at log level. Every suspicious host will be added to the blacklist and if those attempts exceed a given interval, actions to block that particular IP-address can be taken.