Package: fail2ban Severity: wishlist Tags: upstream Hello,
for a few days now my private e-mail server is suffering ssh login attempts from a rather narrow range of IP addreses that are (apparently) all located in China. That is, once one IP is blocked by fail2ban, the attacks continue from another IP of that range shortly thereafter. Would it be possible to broaden the ban rule to ban a whole IP range (say, the 512 surrounding IP addresses) around an offending IP at once? Best regards, - Fabian -- System Information: Debian Release: jessie/sid APT prefers testing APT policy: (990, 'testing'), (990, 'stable'), (900, 'unstable'), (700, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.10-2-amd64 (SMP w/4 CPU cores) Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org