Analyzing SSH Brute Force Attempts

I've been using SSH Guard for years to block brute force SSH login attempts against my home network's gateway and have been logging connection attempts to a database. 10604 unique hosts have been tracked (since the last time the database was cleared).

Informal analysis in the past has shown some pretty ridiculous traffic, whole netblocks have systematically attempted logins. Moving to the next sequential IP address when the current one was blocked (not even switching randomly to a new one).

Recent Hosts

Hosts that have been recently seen attempting to brute force SSH logins.
LocationIPCount
🇺🇸 United States, Herndon 129.28.169.194 Revisit
🇧🇪 Belgium, Sint-Pieters-Leeuw 94.224.187.205 Revisit
🇺🇸 United States, San Francisco 159.203.198.34 Revisit
🇨🇳 China, Hangzhou 122.224.131.116 Revisit
🇨🇳 China, Beijing 140.143.193.52 Revisit
🇮🇳 India, Bengaluru 111.93.235.74 Revisit
🇺🇸 United States 148.70.18.216 Revisit
🇺🇸 United States, Ann Arbor 35.195.238.142 Revisit
🇨🇴 Colombia 201.244.64.146 Revisit
🇺🇸 United States, Santa Cruz 165.227.53.38 Revisit

Attempts over Time