With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Build Securely on AWS with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Intelligently block brute-force attacks by aggregating system logs
SSHGuard protects hosts from brute-force attacks against SSH and other services. It aggregates system logs and blocks repeat offenders using several firewall backends, including iptables, ipfw, and pf.
DenyHosts is a python program that automatically blocks ssh attacks by adding entries to /etc/hosts.deny.
DenyHosts will also inform Linux administrators about offending hosts, attacked users and suspicious logins.
This project is being actively developed on GitHub (https://github.com/denyhosts)
MBM-Log allows to look deeply in collected logs (not only Top 10).
All charts are generated on demand.
You can easily filter data.
MBM-Log can help you with FortiGate diagnostics via SSH (built in commands)
Java GUI application.
Kojoney is an easy of use, secure, robust and powerfull Honeypot for the SSH Service written in Python. With the kojoney daemon are distributeds other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log fi
fwblocker is a script used to parse syslog files for SSH, pure-ftpd and iptables entries. It will generate statistics but it's main feature is to lock out IP addresses that used a wrong username/password to log into your SSH or FTP Server.
LoginWatcher is tailing your messages file and is waiting for an entry representing a failed login attempt via SSH. After a predefined number of attempts, the IP address of the offending host is added to the hosts.deny file to prevent further logins.
Logrep is a tool for collection and presentation of information from various logfiles including snort, squid, postfix, apache, sendmail, iptables/ipchains and nt eventlogs. HTML-reports, multi dimensional analysis, ssh and graphs are available.
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.