Ban / Block IPs via Iptables from your system. The current list contains IP and or IP ranges that tried to break in servers, did massive scans, DDOS'ed the webserver, downloaded a single file from the webserver a gazillion times, brute force attacks on sshd, etc.
Where is the attacking IP localed? Try www.utrace.de or utrace.me/whois/
sudo apt-get install git fail2ban make
git clone https://github.com/JBlond/ban_em_all.git ban
cd ban
make
make
./now.sh 5.9.23.231
./now.sh 1.81.0.0/16
./now6.sh 2406:9DC0:6669::/48
This simple script shows which rules have been used. So maybe over time you can optimize / shorten the list of blocked IPs for your system.
make usage
make china
make chinav6
This will run the block list defined in china.sh. Do this only if you know what you are doing.
make immuniweb
make all
After using one or the other list of this repository and adding IPs with now and now6, you may want to export that exact list
make list
# or
make list > mylist.txt
Also a good place to look for certain IPs is https://www.ip2location.com/free/visitor-blocker
sudo apt install nftables
sudo systemctl enable nftables.service
Sometimes the Let's encrypt IP range is in this. They change their range quiet often. In trouble
run
sudo iptables -F INPUT
sudo iptables --flush bannedDownloader
sudo iptables -X bannedDownloader
Update your certs
run
make
Contributers are welcome. Open Pull request or file an issue.