451
I use Zip Bombs to Protect my Server
(idiallo.com)
This is a most excellent place for technology news and articles.
I've found great success using a hardened ssh config with a limited set of supported
Cyphers/MACs/KexAlgorithms. Nothing ever gets far enough to even triggerfail2ban. Then of course it's key only login from there.