{"id":7299,"date":"2025-10-31T08:48:37","date_gmt":"2025-10-31T01:48:37","guid":{"rendered":"https:\/\/www.cloudaja.id\/artikel\/?p=7299"},"modified":"2025-10-31T08:48:39","modified_gmt":"2025-10-31T01:48:39","slug":"cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban","status":"publish","type":"post","link":"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/","title":{"rendered":"Cara Mengamankan Server Linux dari Serangan SSH Brute Force dengan Fail2Ban"},"content":{"rendered":"<p>Ketika Anda memiliki sebuah server Linux baik itu untuk website, aplikasi, atau layanan internal salah satu pintu utama untuk mengaksesnya adalah SSH (Secure Shell). SSH digunakan oleh administrator untuk masuk ke server secara jarak jauh dengan aman, melakukan konfigurasi, atau memindahkan file.<\/p>\n<p>Namun, karena SSH adalah akses langsung ke sistem, port ini sering menjadi sasaran utama para penyerang. Mereka menjalankan skrip otomatis yang disebut bot brute force, yang mencoba login ke SSH ribuan kali menggunakan kombinasi username dan password acak. Tujuannya hanya satu: menebak kredensial yang benar dan mengambil alih server Anda.<\/p>\n<p>Serangan semacam ini bisa terjadi kapan saja, bahkan pada server baru yang baru saja online beberapa menit. Contohnya, jika Anda membuka port SSH ke publik (biasanya port 22), maka dalam hitungan jam log server Anda bisa berisi ribuan percobaan login gagal dari IP yang berbeda-beda di seluruh dunia.<\/p>\n<p>Dampak dari serangan brute force SSH antara lain:<\/p>\n<ul class=\"wp-block-list\">\n<li>Server menjadi lambat karena banyaknya percobaan login,<\/li>\n\n<li>File log menjadi penuh dengan data tidak penting,<\/li>\n\n<li>Risiko kebocoran akses meningkat jika password lemah,<\/li>\n\n<li>Dan yang paling berbahaya, penyerang bisa mendapatkan akses penuh ke sistem Anda.<\/li>\n<\/ul>\n<p>Untuk mencegah hal itu, Anda tidak harus menutup akses SSH sepenuhnya. Cukup tambahkan lapisan perlindungan otomatis agar server bisa membatasi dan memblokir IP yang mencurigakan di sinilah peran Fail2Ban menjadi sangat penting.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Daftar Isi<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"><\/path><\/svg><\/span><\/span><\/span><\/a><\/span>\n<\/div>\n<nav><ul class=\"ez-toc-list ez-toc-list-level-1 \">\n<li class=\"ez-toc-page-1 ez-toc-heading-level-2\"><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/#Apa_Itu_Fail2Ban\">Apa Itu Fail2Ban?<\/a><\/li>\n<li class=\"ez-toc-page-1 ez-toc-heading-level-2\"><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/#Langkah_1_Persiapan_Sebelum_Instalasi\">Langkah 1: Persiapan Sebelum Instalasi<\/a><\/li>\n<li class=\"ez-toc-page-1 ez-toc-heading-level-2\"><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/#Langkah_2_Instalasi_Fail2Ban\">Langkah 2: Instalasi Fail2Ban<\/a><\/li>\n<li class=\"ez-toc-page-1 ez-toc-heading-level-2\"><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/#Langkah_3_Konfigurasi_Fail2Ban\">Langkah 3: Konfigurasi Fail2Ban<\/a><\/li>\n<li class=\"ez-toc-page-1 ez-toc-heading-level-2\"><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/#Langkah_4_Menjalankan_Fail2Ban\">Langkah 4: Menjalankan Fail2Ban<\/a><\/li>\n<li class=\"ez-toc-page-1 ez-toc-heading-level-2\"><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/#Langkah_5_Mengecek_Status_Perlindungan_SSH\">Langkah 5: Mengecek Status Perlindungan SSH<\/a><\/li>\n<li class=\"ez-toc-page-1 ez-toc-heading-level-2\"><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/#Langkah_6_Menguji_Fail2Ban\">Langkah 6: Menguji Fail2Ban<\/a><\/li>\n<li class=\"ez-toc-page-1 ez-toc-heading-level-2\"><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/#Kesimpulan\">Kesimpulan<\/a><\/li>\n<\/ul><\/nav>\n<\/div>\n<h2 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Apa_Itu_Fail2Ban\"><\/span><strong>Apa Itu Fail2Ban?<\/strong><span class=\"ez-toc-section-end\"><\/span>\n<\/h2>\n<p>Fail2Ban adalah alat keamanan open-source berbasis Python yang dirancang untuk melindungi server dari percobaan login berulang.<br>Fail2Ban bekerja dengan cara:<\/p>\n<ul class=\"wp-block-list\">\n<li>Memantau file log sistem, seperti \/var\/log\/auth.log,<\/li>\n\n<li>Mendeteksi IP yang melakukan percobaan login gagal berulang,<\/li>\n\n<li>Menambahkan aturan firewall otomatis untuk memblokir IP tersebut sementara waktu,<\/li>\n\n<li>Dan setelah waktu tertentu, blokir akan dicabut secara otomatis.<\/li>\n<\/ul>\n<p>Dengan cara ini, Anda tidak perlu lagi memantau log atau memblokir IP secara manual Fail2Ban akan melakukannya untuk Anda secara otomatis dan real-time.<\/p>\n<h2 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Langkah_1_Persiapan_Sebelum_Instalasi\"><\/span>Langkah 1: Persiapan Sebelum Instalasi<span class=\"ez-toc-section-end\"><\/span>\n<\/h2>\n<p>Sebelum mulai memasang Fail2Ban, pastikan beberapa hal berikut:<\/p>\n<ol class=\"wp-block-list\">\n<li>Sistem dalam keadaan up to date <br>sudo apt update &amp;&amp; sudo apt upgrade -y<\/li>\n\n<li>Anda memiliki akses root atau sudo.<\/li>\n\n\n<li>File log SSH aktif di <code>\/var\/log\/auth.log<\/code>.<\/li>\n\n\n<li>Firewall seperti UFW atau iptables sudah terpasang.<br>jika UFW dan ipatbles belum terpasang, untuk caranya bisa klik ini.<\/li>\n<\/ol>\n<h2 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Langkah_2_Instalasi_Fail2Ban\"><\/span>Langkah 2: Instalasi Fail2Ban<span class=\"ez-toc-section-end\"><\/span>\n<\/h2>\n<p>Instal Fail2Ban dengan perintah sederhana:<\/p>\n<pre class=\"wp-block-code\"><code>sudo apt install fail2ban -y<\/code><\/pre>\n<p>Setelah instalasi selesai, Fail2Ban sudah aktif, tetapi masih menggunakan konfigurasi default.<br>Agar proteksi lebih optimal, kita akan melakukan pengaturan manual.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n<h2 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Langkah_3_Konfigurasi_Fail2Ban\"><\/span>Langkah 3: Konfigurasi Fail2Ban<span class=\"ez-toc-section-end\"><\/span>\n<\/h2>\n\n<p><strong>a. Buat file konfigurasi lokal <\/strong><\/p>\n<p>Salin file konfigurasi utama agar perubahan Anda tidak hilang saat update:<\/p>\n<pre class=\"wp-block-code\"><code>sudo cp \/etc\/fail2ban\/jail.conf \/etc\/fail2ban\/jail.local<\/code><\/pre>\n<p>Lalu buka file tersebut:<\/p>\n<pre class=\"wp-block-code\"><code>sudo nano \/etc\/fail2ban\/jail.local<\/code><\/pre>\n\n<p><strong>b. Atur pengaturan umum<\/strong><\/p>\n\n<p>Pada bagian <code>[DEFAULT]<\/code>, ubah menjadi seperti ini:<\/p>\n\n<pre class=\"wp-block-code\"><code>&#91;DEFAULT]\nignoreip = 127.0.0.1\/8 192.168.1.0\/24\nbantime  = 1h\nfindtime = 10m\nmaxretry = 3\nbackend  = systemd<\/code><\/pre>\n<p>Penjelasan singkat:<\/p>\n<ul class=\"wp-block-list\">\n<li>\n<strong>ignoreip<\/strong> \u2192 Daftar IP yang tidak akan diblokir (misalnya IP kantor atau rumah).<\/li>\n\n\n\n<li>\n<strong>bantime<\/strong> \u2192 Lama waktu IP diblokir (misalnya 1 jam).<\/li>\n\n\n\n<li>\n<strong>findtime<\/strong> \u2192 Jangka waktu penghitungan percobaan gagal (misalnya 10 menit).<\/li>\n\n\n\n<li>\n<strong>maxretry<\/strong> \u2192 Jumlah percobaan gagal sebelum IP diblokir.<\/li>\n<\/ul>\n<p><strong>c. Aktifkan proteksi SSH<\/strong><\/p>\n\n<p>Gulir ke bawah dan pastikan bagian <code>[sshd]<\/code> aktif, seperti ini:<\/p>\n\n<pre class=\"wp-block-code\"><code>&#91;sshd]\nenabled = true\nport    = ssh\nfilter  = sshd\nlogpath = %(sshd_log)s\nmaxretry = 4\nfindtime = 5m\nbantime = 1h<\/code><\/pre>\n\n<pre class=\"wp-block-preformatted\">Catatan:<br>Jika Anda menggunakan port SSH selain 22, ubah bagian <code>port<\/code> sesuai dengan port yang Anda gunakan.<\/pre>\n\n<h2 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Langkah_4_Menjalankan_Fail2Ban\"><\/span>Langkah 4: Menjalankan Fail2Ban<span class=\"ez-toc-section-end\"><\/span>\n<\/h2>\n<p>Setelah konfigurasi selesai, jalankan layanan Fail2Ban:<\/p>\n<pre class=\"wp-block-code\"><code>sudo systemctl restart fail2ban\nsudo systemctl enable fail2ban<\/code><\/pre>\n<p>Cek statusnya:<\/p>\n<pre class=\"wp-block-code\"><code>sudo systemctl status fail2ban<\/code><\/pre>\n<p>Jika berjalan dengan baik, Fail2Ban sudah aktif melindungi server Anda.<\/p>\n<h2 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Langkah_5_Mengecek_Status_Perlindungan_SSH\"><\/span>Langkah 5: Mengecek Status Perlindungan SSH<span class=\"ez-toc-section-end\"><\/span>\n<\/h2>\n<p>Untuk melihat layanan yang dipantau Fail2Ban:<\/p>\n<pre class=\"wp-block-code\"><code>sudo fail2ban-client status<\/code><\/pre>\n<p>Untuk melihat detail perlindungan SSH:<\/p>\n<pre class=\"wp-block-code\"><code>sudo fail2ban-client status sshd<\/code><\/pre>\n<p>Anda akan melihat informasi seperti:<\/p>\n<ul class=\"wp-block-list\">\n<li>Jumlah percobaan login gagal,<\/li>\n\n<li>IP yang diblokir,<\/li>\n\n<li>Lama waktu blokir aktif.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Langkah_6_Menguji_Fail2Ban\"><\/span>Langkah 6: Menguji Fail2Ban<span class=\"ez-toc-section-end\"><\/span>\n<\/h2>\n<p>Untuk memastikan Fail2Ban bekerja dengan baik : <\/p>\n<p>1. <strong>Gunakan SSH key<\/strong> sebagai ganti password.<\/p>\n\n<p>2. <strong>Matikan login root<\/strong> dengan mengedit file:<\/p>\n\n<pre class=\"wp-block-code\"><code>sudo nano \/etc\/ssh\/sshd_config<\/code><\/pre>\n<p>3. Ubah port SSH ke port non-standar, misalnya 2222.<\/p>\n<p>4. <strong>Aktifkan firewall UFW<\/strong> dan batasi akses:<\/p>\n\n<pre class=\"wp-block-code\"><code>sudo ufw allow 2222\/tcp\nsudo ufw enable<\/code><\/pre>\n\n<p>5. <strong>Lakukan pembaruan sistem secara berkala<\/strong> untuk menutup celah keamanan.<\/p>\n\n<h2 class=\"wp-block-heading\">\n<span class=\"ez-toc-section\" id=\"Kesimpulan\"><\/span>Kesimpulan <span class=\"ez-toc-section-end\"><\/span>\n<\/h2>\n<p>Serangan brute force terhadap port SSH bisa terjadi kapan saja, bahkan tanpa disadari.<br>Namun, dengan memasang Fail2Ban, Anda memberikan \u201cpenjaga otomatis\u201d bagi server yang siap memblokir siapa pun yang mencoba masuk tanpa izin.<\/p>\n<p>Fail2Ban akan:<\/p>\n<ul class=\"wp-block-list\">\n<li>Mendeteksi pola login mencurigakan,<\/li>\n\n<li>Memblokir IP berbahaya secara otomatis,<\/li>\n\n<li>Dan menjaga akses SSH tetap aman tanpa campur tangan manual.<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Ketika Anda memiliki sebuah server Linux baik itu untuk website, aplikasi, atau layanan internal salah satu pintu utama untuk mengaksesnya adalah SSH (Secure Shell). SSH digunakan oleh administrator untuk masuk ke server secara jarak jauh dengan aman, melakukan konfigurasi, atau memindahkan file. Namun, karena SSH adalah akses langsung ke sistem, port ini sering menjadi sasaran [&hellip;]<\/p>","protected":false},"author":12,"featured_media":7308,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"seo_booster_metabox":"","footnotes":""},"categories":[7],"tags":[1062,1063,65,86,208],"class_list":["post-7299","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux","tag-brute-force","tag-fail2ban","tag-linux","tag-server","tag-ssh"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fail2Ban: Melindungi Akses SSH Anda dengan Aman - CloudAja Artikel | Cloud Hosting Indonesia<\/title>\n<meta name=\"description\" content=\"Lindungi server Linux Anda dengan Fail2Ban. Pelajari bagaimana alat ini dapat mengamankan akses SSH Anda dari serangan brute force.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fail2Ban: Melindungi Akses SSH Anda dengan Aman - CloudAja Artikel | Cloud Hosting Indonesia\" \/>\n<meta property=\"og:description\" content=\"Lindungi server Linux Anda dengan Fail2Ban. Pelajari bagaimana alat ini dapat mengamankan akses SSH Anda dari serangan brute force.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/\" \/>\n<meta property=\"og:site_name\" content=\"CloudAja Artikel | Cloud Hosting Indonesia\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-31T01:48:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-31T01:48:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2025\/10\/Gemini_Generated_Image_dpxjcndpxjcndpxj.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Zhultoni Pradianto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zhultoni Pradianto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\\\/\"},\"author\":{\"name\":\"Zhultoni Pradianto\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/#\\\/schema\\\/person\\\/b4d344bda95fee2dd10b114a4a3bb7f3\"},\"headline\":\"Cara Mengamankan Server Linux dari Serangan SSH Brute Force dengan Fail2Ban\",\"datePublished\":\"2025-10-31T01:48:37+00:00\",\"dateModified\":\"2025-10-31T01:48:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\\\/\"},\"wordCount\":642,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Gemini_Generated_Image_dpxjcndpxjcndpxj.png\",\"keywords\":[\"Brute Force\",\"Fail2Ban\",\"linux\",\"server\",\"ssh\"],\"articleSection\":[\"Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\\\/\",\"url\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\\\/\",\"name\":\"Fail2Ban: Melindungi Akses SSH Anda dengan Aman - CloudAja Artikel | Cloud Hosting Indonesia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Gemini_Generated_Image_dpxjcndpxjcndpxj.png\",\"datePublished\":\"2025-10-31T01:48:37+00:00\",\"dateModified\":\"2025-10-31T01:48:39+00:00\",\"description\":\"Lindungi server Linux Anda dengan Fail2Ban. Pelajari bagaimana alat ini dapat mengamankan akses SSH Anda dari serangan brute force.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Gemini_Generated_Image_dpxjcndpxjcndpxj.png\",\"contentUrl\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Gemini_Generated_Image_dpxjcndpxjcndpxj.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cara Mengamankan Server Linux dari Serangan SSH Brute Force dengan Fail2Ban\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/#website\",\"url\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/\",\"name\":\"CloudAja Artikel | Cloud Hosting Indonesia\",\"description\":\"tips dan trik seputar Cloud Hosting Indonesia\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/#organization\",\"name\":\"CloudAja Artikel | Cloud Hosting Indonesia\",\"url\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/logo-cloudaja.resized.png\",\"contentUrl\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/logo-cloudaja.resized.png\",\"width\":120,\"height\":81,\"caption\":\"CloudAja Artikel | Cloud Hosting Indonesia\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/#\\\/schema\\\/person\\\/b4d344bda95fee2dd10b114a4a3bb7f3\",\"name\":\"Zhultoni Pradianto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/111447a28f2d655e06fc100e62a5c85a596ded9f260d52e257955506d7d27fe5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/111447a28f2d655e06fc100e62a5c85a596ded9f260d52e257955506d7d27fe5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/111447a28f2d655e06fc100e62a5c85a596ded9f260d52e257955506d7d27fe5?s=96&d=mm&r=g\",\"caption\":\"Zhultoni Pradianto\"},\"url\":\"https:\\\/\\\/www.cloudaja.id\\\/artikel\\\/author\\\/zhultoni\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fail2Ban: Melindungi Akses SSH Anda dengan Aman - CloudAja Artikel | Cloud Hosting Indonesia","description":"Lindungi server Linux Anda dengan Fail2Ban. Pelajari bagaimana alat ini dapat mengamankan akses SSH Anda dari serangan brute force.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/","og_locale":"en_US","og_type":"article","og_title":"Fail2Ban: Melindungi Akses SSH Anda dengan Aman - CloudAja Artikel | Cloud Hosting Indonesia","og_description":"Lindungi server Linux Anda dengan Fail2Ban. Pelajari bagaimana alat ini dapat mengamankan akses SSH Anda dari serangan brute force.","og_url":"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/","og_site_name":"CloudAja Artikel | Cloud Hosting Indonesia","article_published_time":"2025-10-31T01:48:37+00:00","article_modified_time":"2025-10-31T01:48:39+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2025\/10\/Gemini_Generated_Image_dpxjcndpxjcndpxj.png","type":"image\/png"}],"author":"Zhultoni Pradianto","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Zhultoni Pradianto","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/#article","isPartOf":{"@id":"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/"},"author":{"name":"Zhultoni Pradianto","@id":"https:\/\/www.cloudaja.id\/artikel\/#\/schema\/person\/b4d344bda95fee2dd10b114a4a3bb7f3"},"headline":"Cara Mengamankan Server Linux dari Serangan SSH Brute Force dengan Fail2Ban","datePublished":"2025-10-31T01:48:37+00:00","dateModified":"2025-10-31T01:48:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/"},"wordCount":642,"commentCount":0,"publisher":{"@id":"https:\/\/www.cloudaja.id\/artikel\/#organization"},"image":{"@id":"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2025\/10\/Gemini_Generated_Image_dpxjcndpxjcndpxj.png","keywords":["Brute Force","Fail2Ban","linux","server","ssh"],"articleSection":["Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/","url":"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/","name":"Fail2Ban: Melindungi Akses SSH Anda dengan Aman - CloudAja Artikel | Cloud Hosting Indonesia","isPartOf":{"@id":"https:\/\/www.cloudaja.id\/artikel\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/#primaryimage"},"image":{"@id":"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2025\/10\/Gemini_Generated_Image_dpxjcndpxjcndpxj.png","datePublished":"2025-10-31T01:48:37+00:00","dateModified":"2025-10-31T01:48:39+00:00","description":"Lindungi server Linux Anda dengan Fail2Ban. Pelajari bagaimana alat ini dapat mengamankan akses SSH Anda dari serangan brute force.","breadcrumb":{"@id":"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/#primaryimage","url":"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2025\/10\/Gemini_Generated_Image_dpxjcndpxjcndpxj.png","contentUrl":"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2025\/10\/Gemini_Generated_Image_dpxjcndpxjcndpxj.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudaja.id\/artikel\/cara-mengamankan-server-linux-dari-serangan-ssh-brute-force-dengan-fail2ban\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudaja.id\/artikel\/"},{"@type":"ListItem","position":2,"name":"Cara Mengamankan Server Linux dari Serangan SSH Brute Force dengan Fail2Ban"}]},{"@type":"WebSite","@id":"https:\/\/www.cloudaja.id\/artikel\/#website","url":"https:\/\/www.cloudaja.id\/artikel\/","name":"CloudAja Artikel | Cloud Hosting Indonesia","description":"tips dan trik seputar Cloud Hosting Indonesia","publisher":{"@id":"https:\/\/www.cloudaja.id\/artikel\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudaja.id\/artikel\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cloudaja.id\/artikel\/#organization","name":"CloudAja Artikel | Cloud Hosting Indonesia","url":"https:\/\/www.cloudaja.id\/artikel\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cloudaja.id\/artikel\/#\/schema\/logo\/image\/","url":"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2022\/09\/logo-cloudaja.resized.png","contentUrl":"https:\/\/www.cloudaja.id\/artikel\/wp-content\/uploads\/2022\/09\/logo-cloudaja.resized.png","width":120,"height":81,"caption":"CloudAja Artikel | Cloud Hosting Indonesia"},"image":{"@id":"https:\/\/www.cloudaja.id\/artikel\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cloudaja.id\/artikel\/#\/schema\/person\/b4d344bda95fee2dd10b114a4a3bb7f3","name":"Zhultoni Pradianto","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/111447a28f2d655e06fc100e62a5c85a596ded9f260d52e257955506d7d27fe5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/111447a28f2d655e06fc100e62a5c85a596ded9f260d52e257955506d7d27fe5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/111447a28f2d655e06fc100e62a5c85a596ded9f260d52e257955506d7d27fe5?s=96&d=mm&r=g","caption":"Zhultoni Pradianto"},"url":"https:\/\/www.cloudaja.id\/artikel\/author\/zhultoni\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/posts\/7299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/comments?post=7299"}],"version-history":[{"count":11,"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/posts\/7299\/revisions"}],"predecessor-version":[{"id":7316,"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/posts\/7299\/revisions\/7316"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/media\/7308"}],"wp:attachment":[{"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/media?parent=7299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/categories?post=7299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudaja.id\/artikel\/wp-json\/wp\/v2\/tags?post=7299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}