I created a droplet 2 months ago and I did the basic things like configuring the firewall, setup ssh to only accept public key auth and stuff.
Last night I was inspecting the logs located at /var/log/auth.log a...
You can improve and reduce the attack attempts by:
Disabling password passed authentication and using RSA SSH keys
Configurig your firewall and ssh to only allow your IP (you need to have a static IP)
Using 2FA, for e...