Logo SSHwatch help & support Logo SSHwatch help & support
  • SSHwatch dashboard
  • SSHwatch service status
Logo SSHwatch help & support Logo SSHwatch help & support
  • SSHwatch dashboard
  • SSHwatch service status
  • Getting started
    • Signing up or logging in
    • Navigating the dashboard
    • Starting and managing subscription plans
  • Adding servers
    • Installing the agent
  • Navigating the dashboard
    • Viewing log details
    • SSH Session Monitoring
    • Managing Team Members
    • Using the Events Feature
    • Security assessment
    • Exporting logs as CSV
    • Understanding Risk Scores
  • Configuring response actions
    • Configuring alerts
    • Configuring actions
    • Configuring webhooks
  • Using blocklists
    • Using the blocklist on your systems
    • Using the Threat Intelligence API Platform
  • Data Retention and Privacy
    • Data Retention and Privacy
  1. Overview
  2. Using blocklists

Using blocklists

  • Using the blocklist on your systems

    This documentation describes how to use the SSHWatch blocklist service to protect your Linux systems from malicious IP addresses. The service provides an API endpoint that returns a list of IP addresses that have been identified as sources of malicious ac ...

  • Using the Threat Intelligence API Platform

    This technical documentation provides developers with detailed information about the SSHwatch Threat Intelligence API endpoints, request/response formats, error handling, and implementation guidelines. API Overview The SSHwatch Threat Intelligence API p ...

© 2025 SSHwatch help & support
  • SSHwatch dashboard
  • SSHwatch service status