• Company
    • About Us
    • Case Studies
    • Press Center
    • Events
    • Careers
    • Blog
    • Contact us
  • Contact us
  • Login
 
  • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • Português
Paessler
                    - The Monitoring Experts
  • Products
    • Paessler PRTG
      Paessler PRTGMonitor your whole IT infrastructure
      • PRTG Network Monitor
      • PRTG Enterprise Monitor
      • PRTG Hosted Monitor
      • PRTG extensionsExtensions for Paessler PRTGExtend your monitoring to a new level
    • Icon Features
      FeaturesExplore all monitoring features
      • Maps & dashboards
      • Alerts & notifications
      • Multiple user interfaces
      • Distributed monitoring
      • Customizable reporting
  • Solutions
    • Industries
      IndustriesMonitor various industry sectors
      • Industrial
      • Healthcare
      • Data Center
      • Education
      • Finance
      • Government
    • IT Topics
      IT TopicsMonitor all areas of IT
      • Network Monitoring
      • Bandwidth Monitoring
      • SNMP Monitor
      • Network Mapping
      • WiFi Monitoring
      • Server Monitoring
  • Pricing
  • Resources
    • Getting Started
      Getting StartedModules for self-paced learning
    • How-to Guides
      How-to GuidesGet the most out of PRTG
    • Videos & Webinars
      Videos & WebinarsLearn from Paessler experts
    • IT  Knowledge
      IT KnowledgeExpand your IT knowledge
    • PRTG Manual
      PRTG ManualFull documentation
    • Knowledge Base
      Knowledge BaseShare community knowledge
    • PRTG Sensor Hub
      PRTG Sensor HubGet sensors, scripts & templates
    • Trainings
      PRTG TrainingLearn how to work with PRTG
  • Partners
    • icon star
      New Partners and MSPBecome a new partner or MSP
    • icon partner
      Partner PortalLog in to your partner account
    • icon search
      Find a PartnerFind partners selling Paessler products
    • icon technology
      Technology AlliancesSee Paessler technology partnerships
  • Company
    • About Us
    • Case Studies
    • Press Center
    • Events
    • Careers
    • Blog
    • Contact us
  • Contact us
  • Login
  • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • Português
  • Get a quote
  • Free trial
  1. Home>
  2. IT Topics>
  3. Technology>
  4. SSH Monitoring
PRTG Logo

SSH Monitoring with PRTG

Check mission-critical Unix network components securely

  • Monitor macOS, Linux, and other Unix-based devices through Secure Shell
  • Keep an eye on the health and performance of your SAN
  • Get automatically alerted about performance issues with custom notifications
Free download
product overview

Our users give top ratings for monitoring with Paessler PRTG

Gartner peer insights
spiceworks
Capterra
G2
Trustpilot

PRTG SSH monitoring: What you will find on this page

Table of content
  • Greater security doesn’t mean less usability
  • What SSH monitoring looks like in PRTG
  • 4 reasons why to choose PRTG as your SSH monitoring tool
  • Explore our preconfigured PRTG sensors for SSH monitoring
  • SSH Monitoring: FAQ

PRTG makes SSH monitoring as easy as it gets

Custom alerts and data visualization let you quickly identify and prevent Linux server availability and performance issues.

Free download
PRODUCT OVERVIEW

Greater security doesn’t mean less usability

It's hard to beat SSH for security.

But if your organization's network uses various Windows Server versions as well as macOS and Linux systems, and other Unix network devices – and, let's face it, that's the case in most organizations – the number of different monitoring tools you'll need to have in place can quickly reach a hair-tearing level of complexity.

The whole point of network monitoring tools is that they should make your life easier, not harder. Which is why we've designed Paessler PRTG to be as simple and intuitive as it gets.

Whether your devices support SSH, SNMP, or another protocol, our monitoring environment brings together all your data in one place, giving you a single, unified view of your network's health, and taking the effort out of ensuring it stays fast, stable, and reliable.

What SSH monitoring looks like in PRTG

Diagnose network issues by continuously tracking FTP servers, storage area networks (SAN), and Linux network components. Show response time, disk space, system health, and other key metrics in real time. Visualize monitoring data in clear graphs and dashboards to identify problems more easily. Gain the overview you need to troubleshoot low availability, high memory load, lack of disk space, and more.

prtg-screenshot-map-aws-linux-windows-services

PRTG map of AWS, Linux and Windows services

PRTG Screenshot device tree view

Device tree view of the complete monitoring setup

PRTG screenshot map entire it infrastructure

Custom PRTG dashboard for keeping an eye on the entire IT infrastructure

prtg screenshot map aws linux windows services

AWS, Microsoft & Linux Map in PRTG

Start monitoring via SSH with PRTG and see how it can make your network more reliable and your job easier.

Free download
PRODUCT OVERVIEW

IT experts agree: Paessler PRTG is a great solution for IT infrastructure monitoring

PCMag

“All-around winning
 network monitor”

IT Brief

“The real beauty of PRTG is the endless possibilities it offers”

ITPro

“PRTG Network Monitor 
is very hard to beat”

4 reasons why to choose PRTG as your SSH monitoring tool

icon configuration

Effortless setup

No need to fiddle about with device settings. Or, worse, install software on every device you want to monitor. Our agentless monitoring software comes with an automatic network discovery that will detect the devices, establish your SSH connection, and even set up the appropriate sensors for you.

icon maps

Complete visibility

Availability. Performance. Operating system status. Memory. Server load. With a range of SSH-native sensors and the ability to create your own, PRTG can track every variable you can think of, and present the data in a format anyone can understand.

icon alarm

Speedy troubleshooting

Zoom in on problems promptly, before they spiral out of control. Once you pick your preferred thresholds, PRTG watches them like a hawk and alerts you using customizable notification templates if your device risks going under or over. Which means fewer disruptions and a shorter to-do list.

icon security

Secure data traffic

Keep track of important health stats, without putting your organization at risk. PRTG's SSH sensors support all major encryption algorithms and authentication cyphers, so unauthorized individuals won't be able to make sense of your data, even if they manage to intercept it.

Explore our preconfigured PRTG sensors for SSH monitoring

PRTG comes with more than 250 native sensor types for monitoring your entire on-premises, cloud, and hybrid cloud environment out of the box. Check out some examples below!

SSH Meminfo

The SSH Meminfo sensor monitors the memory usage of a Linux/Unix system using Secure Shell (SSH). It can show the following:

  • Available memory
  • Downtime
SSH Meminfo
SSH Meminfo

SSH Load Average

The SSH Load Average sensor monitors the load average of a Linux/Unix system using Secure Shell (SSH). It can show the following:

  • Average system load within a 1-minute, 5-minute, and 15-minute interval
  • Downtime
SH Load Average
SH Load Average

SSH INodes Free

The SSH INodes Free sensor the free index nodes on disks of Linux/Unix and macOS systems via Secure Shell (SSH). It can show the following:

  • Downtime
  • Free index nodes for the mount
SSH INodes Free
SSH INodes Free

SSH Script Advanced

The SSH Script Advanced sensor connects to a Linux/Unix system via Secure Shell (SSH) and executes a script file that is located on the target system. This option is available as part of the PRTG API. It can show the following:

  • Execution time
  • Values that the script file returns in several channels
SSH Script Advanced
SSH Script Advanced

See the PRTG Manual for a list of all available sensor types.

PRTG is compatible with all major vendors, products, and systems

compatible with all major vendors, products, and systems

PRTG makes SSH monitoring as easy as it gets

Custom alerts and data visualization let you quickly identify and prevent Linux server availability and performance issues.

Free download
PRODUCT OVERVIEW

“We strive to equip our systems with state-of-the-art technology to safeguard our educational practices for the future. Part of this includes ensuring that all our systems run smoothly at all times. On any given day, we rarely have time to keep an eye on all our systems. We therefore decided to monitor our school’s IT environment with a centralized network monitoring tool.”

Stefan Roschewitz, IT administrator
BBS Holzminden

“We want to include the tool in our set of solutions in order to solve problems more proactively in our technology infrastructure. PRTG has exceeded all our expectations because it is a reliable, extremely easy-to-use solution. There is no doubt that it lives up to the renowned quality of German technology.”

Esbin Saúl Lázaro García, IT Infrastructure and Security Engineer
Hospital El Pilar

“The reactivity, know-how, and technical solutions of Paessler are outstanding in every situation. For me, no monitoring tool compares to PRTG.”

Andreas Reimann, Senior Networking Communication Architect
Zurich Airport

Your SSH monitor at a glance – even on the go

PRTG is set up in a matter of minutes and can be used on a wide variety of mobile devices.

device overview
Gartner peer insights

“Excellent tool for detailed monitoring. Alarms and notifications work greatly. Equipment addition is straight forward and server initial setup is very easy. ...feel safe to purchase it if you intend to monitor a large networking landscape.”

Read the complete review at Gartner Peer Insights

Create innovative solutions with Paessler’s IT partners

Partnering with innovative IT vendors, Paessler unleashes synergies to create
new and additional benefits for joined customers.

NetBrain

NetBrain

Integrating monitoring results from PRTG into NetBrain maps makes the foundation for network automation.

Read more
Plixer

Plixer

Paessler and Plixer provide a complete solution adding flow and metadata analysis to a powerful network monitoring tool.

Read more
UVnetworks

UVnetworks

UVexplorer integrates tightly with PRTG to bring fast and accurate network discovery, detailed device inventory, and automatic network mapping to the PRTG platform.

Read more

Find the root cause of the problem with our PRTG SSH monitoring solution

Real-time notifications mean faster troubleshooting so that you can act before more serious issues occur.

Free download
PRODUCT OVERVIEW
Paessler PRTG

Paessler PRTG

Network Monitoring Software – Version 25.2.106.1114 (May 05th, 2025)

Hosting icon

Hosting

Download for Windows and cloud-based version PRTG Hosted Monitor available

Languages icon

Languages

English, German, Spanish, French, Portuguese, Dutch, Russian, Japanese, and Simplified Chinese

test

Monitor everything

Network devices, bandwidth, servers, applications, virtual environments, remote systems, IoT, and more

test

Pricing

Choose the PRTG Network Monitor subscription that's best for you

Discover more monitoring insights and stories

Resources Solution

Solutions for all your monitoring needs

  • PRTG for Linux
  • Linux network monitoring
  • PRTG Roadmap
Resources Content

Powerful stories from the monitoring world

  • Sensor of the Week: SSH Disk Free Sensor
  • Sensor of The Week: SSH VMware ESX(i) Disk Sensor
  • Sensor of the Week: SSH Script Advanced Sensor
Resources Solutions

Resources to master your monitoring challenges

  • Is there a way to monitor SSH availability for a Router?
  • Monitoring via SSH
  • Are there SSH script for monitoring AIX 7.1 Disk usage ?

SSH Monitoring: FAQ

 

What is the SSH protocol?

SSH (Secure Shell) is a protocol that creates an encrypted connection between two systems, enabling them to exchange data securely over unsecured connections.

Think of it as sending a padlocked box made of bulletproof steel through the post. While somebody might be able to get their hands on the box without permission, doing so would be useless, because the tough material and padlock mean they wouldn't be able to open it and find out what's inside.

Similarly, while somebody might be able to intercept data transferred over SSH, they wouldn't be able to make sense of it without the encryption key.

How does SSH work?

The SSH client initiates a connection to the SSH server on a specific port (default is port 22).

The SSH server responds with its public key and a list of supported encryption and hashing algorithms.

The client and server negotiate to select a mutually supported encryption, hashing, and SSH key exchange algorithm.

The client and server use the chosen key exchange algorithm (e.g., Diffie-Hellman) to securely generate a shared secret key. This key is used to encrypt the session.

The client uses the server's public key to verify the server’s identity. If the server’s public key matches a known and trusted key stored on the client, the server is authenticated.

The client must authenticate itself to the server using one or more methods such as:

  • The client sends a password to the server (encrypted).
  • The client uses a private key to sign a message. The server verifies this signature using the client’s public key.

Once both the server and client are authenticated, an encrypted session is established using the shared secret key.

All data sent between the client and server is encrypted, ensuring confidentiality and integrity. SSH can be used for various purposes such as remote command execution, file transfer (using SCP or SFTP), and tunneling other protocols.

What is SSH monitoring?

SSH (Secure Shell) monitoring refers to the process of overseeing and tracking activities and connections related to SSH, a protocol used for securely accessing remote computers. Main aspects include:

  • Session logs: Monitoring logs to track when users connect and disconnect, including timestamps and source IP addresses.
  • Failed login attempts: Keeping an eye on failed login attempts to identify potential brute-force attacks or unauthorized access attempts.
  • Concurrent sessions: Monitoring the number of active SSH sessions to detect unusual activity or resource usage.
  • Command logging: Tracking commands executed by users during their SSH sessions to audit actions and detect malicious activities.
  • File transfers: Monitoring file uploads and downloads via SCP or SFTP to ensure data security and compliance with policies.
  • Unusual patterns: Detecting unusual login patterns, such as access from unusual locations or at unusual times.
  • Intrusion detection: Integrating with intrusion detection systems (IDS) to correlate SSH activity with other network events for comprehensive security monitoring.
  • Resource usage: Monitoring the resources consumed by SSH sessions, such as CPU and memory usage, to ensure system performance.
  • Latency and throughput: Tracking the performance of SSH connections to diagnose network issues or bottlenecks.
  • Access control: Ensuring that only authorized users can establish SSH connections.
How does SSH monitoring work in PRTG?

PRTG can collect health and performance data and system information from any device that supports SSH access. This includes macOS, Linux, and UNIX-based hardware or software. SSH's security, encryption, and remote access and command execution capabilities also make it a good choice for monitoring storage area networks.

How do I set up SSH monitoring in PRTG?

In PRTG's device settings, key in the login details for the system you want to monitor, ideally with root access. That's it. PRTG will connect to it and establish the connection. You can log in with a password or OpenSSH-RSA private key, and set it up so any new devices are added to your monitoring environment automatically.

Which types of encryption algorithms do PRTG's SSH sensors support?

PRTG supports ciphers, MACs, key exchange algorithms, and host key algorithms. Here's a list of the specific values we support.

What is a sensor in PRTG?

In PRTG, “sensors” are the basic monitoring elements. One sensor usually monitors one measured value in your network, for example the traffic of a switch port, the CPU load of a server, or the free space on a disk drive. On average, you need about 5-10 sensors per device or one sensor per switch port.

We asked: would you recommend PRTG? Over 95% of our customers say yes!

Paessler conducted trials in over 600 IT departments worldwide to tune its network monitoring software closer to the needs of sysadmins. The result of the survey: over 95% of the participants would recommend PRTG – or already have.

recommendation

Still not convinced?

Love

More than 500,000 sysadmins love PRTG

Paessler PRTG is used by companies of all sizes. Sysadmins love PRTG because it makes their job a whole lot easier.

PRTG

Monitor your entire IT infrastructure

Bandwidth, servers, virtual environments, websites, VoIP services – PRTG keeps an eye on your entire network.

test

Try Paessler PRTG for free

Everyone has different monitoring needs. That’s why we let you try PRTG for free.

PRTG Logo

Start monitoring via SSH with PRTG and see how it can make your network more reliable and your job easier.

Free download
PRODUCT OVERVIEW

Products

  • Paessler PRTG
    Paessler PRTGMonitor your whole IT infrastructure
    • PRTG Network Monitor
    • PRTG Enterprise Monitor
    • PRTG Hosted Monitor
    • PRTG extensions
      Extensions for Paessler PRTGExtend your monitoring to a new level
  • Icon Features
    FeaturesExplore all monitoring features

Monitoring with PRTG

  • Network monitoring
  • Bandwidth monitoring
  • SNMP monitoring
  • Network mapping
  • Wi-Fi monitoring
  • Server monitoring
  • Network traffic analyzer
  • NetFlow monitoring
  • Syslog server

Useful Links

  • PRTG Manual
  • Knowledge Base
  • Customer Success Stories
  • About Paessler
  • Subscribe to newsletter
  • PRTG Support
  • PRTG Consulting

Contact

Paessler GmbH
Thurn-und-Taxis-Str. 14, 
90411 Nuremberg 
Germany

info@paessler.com

+49 911 93775-0

  • Contact us
©2025 Paessler GmbHTerms & ConditionsPrivacy PolicyImprintReport VulnerabilityDownload & InstallSitemap
404 - Page not found 404 - Page not found 404 - Page not found