I think it's more important to invest time in generally hardening ssh. Anyone who hasn't done so should check out the sticky thread "Failed SSH login attempts" which mentions a lot of measures to take. Besides that, what if the "attackers IP" is a dynamic one? Doesn't do anything but waste resources.
Anyway. This thread is getting more and more OT and that should stop. If you want to ask questions that are not related to solving the OP's problem, please make your own thread or use email.
|