02.08.2013 - Filter for brute-force interactive SSH logins I would argue that monitoring logs is a weak solution especially if you have a weak password on .