Package: fail2ban
Severity: wishlist
Tags: upstream

Hello,

for a few days now my private e-mail server is suffering ssh login attempts
from a rather narrow range of IP addreses that are (apparently) all located in
China. That is, once one IP is blocked by fail2ban, the attacks continue from
another IP of that range shortly thereafter. Would it be possible to broaden
the ban rule to ban a whole IP range (say, the 512 surrounding IP addresses)
around an offending IP at once?

Best regards,

 - Fabian



-- System Information:
Debian Release: jessie/sid
  APT prefers testing
  APT policy: (990, 'testing'), (990, 'stable'), (900, 'unstable'), (700, 
'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.10-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to