I am interest ed in working with you. Please tell me what you need
This is true. However its not about completely preventing 100% of attacks, as that would always be impossible regardless of what you employ. More, it works like an AV product, we dont expect all viruses to be stopped 100% of the time by an av product but it does lower your attack profile and thus your risk is mitigated by some %. The more things you do, and the more differing methods you have employed, the smaller your attack surface. In practice I notice it reduces brute force attacks by 95% or so, which is better than not employing such a solution in addition to your other hardening methods. Thats just my opinion.
I see your point, but that is something IDS/IPS is for (in fact it works exactly like AV and blocks not only known malicious IPs, but also IPs which are trying to exploit certain well and less well known vulnreabilities, something that IP blocking does not do.)If you insist on having IP block list and are hosting your servers on LINUX, you can install Fail2ban which does exactly that, blocks IPs which try too many times to login, you just have to configure it right, in fact I think there is a way to install Fail2Ban on OpnSense itself.