Block globally reported hack attempts using your local iptables firewall rules

# curl -s > /etc/cron.daily/sync-fail2ban
# chmod a+x /etc/cron.daily/sync-fail2ban

Initial run manually:

# /etc/cron.daily/sync-fail2ban

The following day, check /tmp/iptables.fail2ban.log file to see who’s been blocked.
The lists are stored locally in /etc/fail2ban/blacklist.*

Leave a Reply

Your email address will not be published. Required fields are marked *

two × 5 =

This site uses Akismet to reduce spam. Learn how your comment data is processed.