Mar 9 19:27:44 ka sshd[25416]: Invalid user admin from 117.32.249.214 Mar 9 19:27:50 ka sshd[25420]: Invalid user stud from 117.32.249.214 Mar 9 19:27:53 ka sshd[25422]: Invalid user trash from 117.32.249.214 Mar 9 19:27:56 ka sshd[25424]: Invalid user aaron from 117.32.249.214 Mar 9 19:27:59 ka sshd[25426]: Invalid user gt05 from 117.32.249.214 Mar 9 19:28:02 ka sshd[25428]: Invalid user william from 117.32.249.214 Mar 9 19:28:06 ka sshd[25430]: Invalid user stephanie from 117.32.249.214 Mar 9 19:28:24 ka sshd[25443]: Invalid user gary from 117.32.249.214 Mar 9 19:28:30 ka sshd[25448]: Invalid user guest from 117.32.249.214 Mar 9 19:28:33 ka sshd[25450]: Invalid user test from 117.32.249.214 Mar 9 19:28:37 ka sshd[25452]: Invalid user oracle from 117.32.249.214 Mar 9 19:29:44 ka sshd[25499]: Invalid user apache from 117.32.249.214 Mar 9 19:29:54 ka sshd[25505]: Invalid user lab from 117.32.249.214 Mar 9 19:30:00 ka sshd[25510]: Invalid user oracle from 117.32.249.214 Mar 9 19:30:03 ka sshd[25512]: Invalid user svn from 117.32.249.214 Mar 9 19:30:06 ka sshd[25673]: Invalid user iraf from 117.32.249.214 Mar 9 19:30:09 ka sshd[25841]: Invalid user swsoft from 117.32.249.214 Mar 9 19:30:12 ka sshd[25843]: Invalid user production from 117.32.249.214 Mar 9 19:30:19 ka sshd[25847]: Invalid user guest from 117.32.249.214 Mar 9 19:30:22 ka sshd[25849]: Invalid user gast from 117.32.249.214 Mar 9 19:30:25 ka sshd[25852]: Invalid user gast from 117.32.249.214 Mar 9 19:30:28 ka sshd[25854]: Invalid user oliver from 117.32.249.214 Mar 9 19:30:31 ka sshd[25856]: Invalid user sirsi from 117.32.249.214 Mar 9 19:30:34 ka sshd[25858]: Invalid user nagios from 117.32.249.214 Mar 9 19:30:37 ka sshd[25860]: Invalid user nagios from 117.32.249.214 Mar 9 19:30:41 ka sshd[25862]: Invalid user nagios from 117.32.249.214 Mar 9 19:30:44 ka sshd[25864]: Invalid user nagios from 117.32.249.214 Mar 9 19:30:47 ka sshd[25866]: Invalid user backuppc from 117.32.249.214 Mar 9 19:30:50 ka sshd[25868]: Invalid user wolfgang from 117.32.249.214 Mar 9 19:30:53 ka sshd[25870]: Invalid user vmware from 117.32.249.214 Mar 9 19:30:56 ka sshd[25872]: Invalid user stats from 117.32.249.214 Mar 9 19:30:59 ka sshd[25874]: Invalid user kor from 117.32.249.214 Mar 9 19:31:02 ka sshd[25877]: Invalid user wei from 117.32.249.214 Mar 9 19:31:05 ka sshd[25879]: Invalid user cvsuser from 117.32.249.214 Mar 9 19:31:09 ka sshd[25881]: Invalid user cvsuser from 117.32.249.214 Mar 9 19:31:12 ka sshd[25883]: Invalid user cvsuser from 117.32.249.214 Mar 9 19:31:15 ka sshd[25885]: Invalid user javi from 117.32.249.214 Mar 9 19:31:18 ka sshd[25887]: Invalid user ubuntu from 117.32.249.214 Mar 9 19:31:21 ka sshd[25890]: Invalid user blog from 117.32.249.214 Mar 9 19:31:36 ka sshd[25901]: Invalid user diane from 117.32.249.214 Mar 9 19:31:42 ka sshd[25905]: Invalid user student from 117.32.249.214 Mar 9 19:31:46 ka sshd[25907]: Invalid user test from 117.32.249.214 Mar 9 19:31:49 ka sshd[25909]: Invalid user guest from 117.32.249.214 Mar 9 19:31:52 ka sshd[25911]: Invalid user guest from 117.32.249.214 Mar 9 19:31:55 ka sshd[25914]: Invalid user test from 117.32.249.214 Could you imagine methods of security visualization for such logs? (don't hesitate to draw on your sheet) Do you see something missing on those logs that could be collected to help the security monitoring and help the security visualization too?