If you must maintain an 'open' SSH server, this might come in handy.
This is a quick way to view the top ten worst offending SSH
attackers in your secure log. It works on Red Hat-based Linux boxen
(e.g., CentOS, Fedora), but it can easily be modified for other OS's
by just changing the pattern or logfile.