555
I use Zip Bombs to Protect my Server
(idiallo.com)
This is a most excellent place for technology news and articles.
I've found great success using a hardened ssh config with a limited set of supported
Cyphers
/MACs
/KexAlgorithms
. Nothing ever gets far enough to even triggerfail2ban
. Then of course it's key only login from there.