This is a map showing where all attempted SSH logins to this 28 | server in the past 14 days originated from. These logins were likely 29 | attempted by hackers scanning the internet for insecure servers. 30 | The size of a marker indicates how recently the attempt happened. 31 | A darker color indicates many attempts came from that location.
32 |I have my server set up to not accept password authentication, 34 | only SSH keys. This makes all of these automated attacks worthless, 35 | save for any unkown vulnerabilities in SSH. It does however illustrate 36 | the need for awereness of security. If you expose any device to the 37 | internet, people will attempt to break in.
38 |SSH is a protocol used to connect to computers with unix-like operating systems remotely.
40 |