SSHGuard protects hosts from brute-force attacks by monitoring system logs, detecting attacks, and blocking attackers using a firewall. It works by monitoring system log files and journal logs from various sources like cockpit, Common Log Format, macOS log, metalog, multilog, raw log files, syslog, syslog-ng, and systemd journal. SSHGuard's parser is fast, sandboxed, and secure, as it compiles attack signatures into a full lexical analyzer that does not slow down with more signatures, runs as a separate unprivileged process, and is not susceptible to regular expression denial of service attacks.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
NordVPN is a commercial VPN service that encrypts internet connections and hides IP addresses through a global network of servers, featuring integrated threat protection and multi-device support.
Unfurl is a URL analysis tool that extracts and visualizes data from URLs, breaking them down into components and presenting the information visually.
A TCP-based traceroute implementation that bypasses firewall filters to trace the path to a destination.
Tor Browser is a free and open-source software that allows users to browse the internet anonymously and privately.
A free, open-source network protocol analyzer for capturing and displaying packet-level data.
A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.
Snort is an open source intrusion prevention system that uses rules to detect and prevent malicious network activity.
NBD (Network Block Device) is a network protocol implementation that allows clients to access remote block devices over a network as if they were local storage.
A userland implementation of the Network Block Device protocol that enables remote block device access over network connections for distributed storage and virtualization use cases.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.