I changed the Windows 3389 port through the router to a high value port and exposed it to the public network. I was attacked by brute force password cracking attacks every time. This software really helped. As can be seen from the RDSH 140 incident, password guessing occurred after using RDPBloker stopped, but as can be seen from the RDSH 131 event and Wireshark packet capture, the TCP connection is still established, and the entry that RDPBlocker should have created cannot be found in the Windows Advanced Firewall panel. Fail2ban feature seems not working. It is recommended that these attack sources be added to the firewall blacklist and TCP connections should not be established.
before-rdpblocker

after-rdpblocker-running
