fail2ban

Scan log files and ban IPs showing malicious signs

https://www.fail2ban.org/

/api/formula-linux/fail2ban.json (JSON API)

Linux formula code on GitHub

Current versions:

stable 0.10.4
bottle 🍾 mojave, high_sierra, sierra, x86_64_linux

Depends on:

python@2 2.7.17 Interpreted, interactive, object-oriented programming language

Depends on when building from source:

help2man 1.47.11 Automatically generate simple man pages
sphinx-doc 2.2.1 Tool to create intelligent and beautiful documentation
Before using Fail2Ban for the first time you should edit the jail
configuration and enable the jails that you want to use, for instance
ssh-ipfw. Also, make sure that they point to the correct configuration
path. I.e. on Mountain Lion the sshd logfile should point to
/var/log/system.log.

    * $(brew --prefix)/etc/fail2ban/jail.conf

The Fail2Ban wiki has two pages with instructions for macOS Server that
describes how to set up the Jails for the standard macOS Server
services for the respective releases.

    10.4: https://www.fail2ban.org/wiki/index.php/HOWTO_Mac_OS_X_Server_(10.4)
    10.5: https://www.fail2ban.org/wiki/index.php/HOWTO_Mac_OS_X_Server_(10.5)

Please do not forget to update your configuration files.
They are in $(brew --prefix)/etc/fail2ban.

Analytics:

Installs (30 days)
fail2ban 1
Installs on Request (30 days)
fail2ban 1
Build Errors (30 days)
fail2ban 0
Installs (90 days)
fail2ban 3
Installs on Request (90 days)
fail2ban 3
Installs (365 days)
fail2ban 15
Installs on Request (365 days)
fail2ban 15
Fork me on GitHub