Here’s how to do it:
firewall-cmd --zone=internal --add-service=ssh --permanent firewall-cmd --zone=internal --add-source=220.127.116.11/32 --permanent firewall-cmd --zone=internal --add-source=18.104.22.168/32 --permanent firewall-cmd --zone=public --remove-service=ssh --permanent firewall-cmd --reload
This declares an internal zone with two IPs (add as many or as few as you like) and subsequently removes the SSH service from the public zone altogether. As a result, any other IP gets a message such as “Connection refused” when trying to connect via SSH.
The “–permanent” switch saves the changes. Remove it for testing or if you don’t want this change to be permanent.
The last line reloads the current firewall rules (thanks, CertDepot).