Update: a more comprehensive, tiered version of the procedure below is outlined in Escalating Consquences with ipTables. The material below is, however still applicable, and forms the basis for many more advanced implementations. For the past few weeks, I have noticed that the scale of attempted intrusions, on ssh, pop3, and ftp ports has increased… Continue reading Limiting brute-force attacks with IPTables