| AliDbg/IPBAN |
64 |
|
0 |
0 |
about 2 years ago |
0 |
|
2 |
mit |
Shell |
| ⚔️🧱🔥🛑IP BAN Block Allow GEOIP country traffic limit server input/output to IP countries with iptables+xt_geoip, auto db-ip update, firewall fail2ban gfw ufw cidr blacklist netfilter rules persistent restrict netaddr xtables linux debian ubuntu apache nginx web server anti hack ddos firewalld ipblocks ipdeny ip ranges MaxMind ipset |
| mkorthof/ipset-country |
34 |
|
0 |
0 |
about 4 years ago |
0 |
|
0 |
gpl-2.0 |
Shell |
| Block countries using iptables + ipset + ipdeny.com |
| tlhackque/BlockCountries |
30 |
|
0 |
0 |
over 9 years ago |
0 |
|
6 |
other |
Perl |
| iptables manager for IP blocking by country |
| falsandtru/iptables-firewall |
29 |
|
0 |
0 |
over 11 years ago |
0 |
|
0 |
mit |
|
| iptables rule generating and management script. |
| binwiederhier/socksproxy |
17 |
|
0 |
0 |
about 11 years ago |
0 |
|
1 |
|
Shell |
| Simple SOCKS proxy via SSH and iptables |
| bugi/iptables-by-country |
15 |
|
0 |
0 |
over 11 years ago |
0 |
|
1 |
|
Shell |
| load geographical data into iptables |
| boldleadsdevelopment/lockdown-lists |
13 |
|
0 |
0 |
about 5 years ago |
0 |
|
0 |
|
|
| Our publicly available blacklists and country IP CIDR blocks. |
| 42wim/asallow |
10 |
|
0 |
0 |
almost 6 years ago |
1 |
May 20, 2020 |
0 |
gpl-2.0 |
Go |
| whitelist providers and/or countries using ipset, iptables and ripe data |
| tg12/STOP_d |
6 |
|
0 |
0 |
about 8 years ago |
0 |
|
0 |
|
Shell |
| SSH/IPTables Country Blocker |
| psotos/TrumpsWall |
6 |
|
0 |
0 |
over 9 years ago |
0 |
|
0 |
|
Java |
| This program will scan the fail2ban.log and auth.log files looking for hacking/port scanning attempts. If someone gets banned, or a port scan is detected, the program will determine the country code of the attacker using https://www.abuseipdb.com/check/xxx.xxx.xxx.xxx and compare that to a "Bad Country" settings file. Any country code in that file will get the command "sudo iptables -I INPUT 3 -s xxx.xxx.0.0/16 -j DROP" run on that IP. If the country code is not in that file then it will simply do a normal drop on the IP running this command: "sudo iptables -I INPUT 3 -s xxx.xxx.xxx.xxx -j DROP". |