-
-
Save spnow/9fbf0c5d4bdbeff58bc341042e3d1dea to your computer and use it in GitHub Desktop.
Download a public blocklist of SSH brute scanning hosts and drop their connection attempts via pure iptables
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
curl -s http://lists.blocklist.de/lists/ssh.txt > /tmp/ssh-ips.txt | |
if [ "$1" == "--force" ]; then | |
iptables -F AUTO_BLACKLIST | |
iptables -A AUTO_BLACKLIST -j RETURN | |
fi | |
/usr/sbin/iptables -L AUTO_BLACKLIST -n | awk '/^DROP / { print $4 }' > /tmp/ip_ssh_blocked | |
i=0 | |
for src in $(cat /tmp/ssh-ips.txt); do | |
if [ "$1" != "--force" ]; then | |
grep -q "^$src\$" /tmp/ip_ssh_blocked || /usr/sbin/iptables -I AUTO_BLACKLIST -s $src -j DROP && i=$(($i + 1)) | |
else | |
/usr/sbin/iptables -I AUTO_BLACKLIST -s $src -j DROP | |
i=$(($i + 1)) | |
fi | |
done | |
echo $i hosts added |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment