You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Here is the finalized content for /etc/fail2ban/filter.d/zoraxy-strict.conf
[Definition]# Detection: Matches the client IP and the exploit signaturesfailregex = \[router:exploit-blocked\].*?\[client:\s*<HOST>\]
# Exclusions: Ignore internal IPv4 (192.168.x.x) and IPv6 Link-Local (fe80::)ignoreregex = \[client:\s*(?:192\.168\.|fe80:).*\]
datepattern = ^%%Y/%%m/%%d %%H:%%M:%%S
Draft jail
[DEFAULT]# Global Whitelist: # 127.0.0.1/8 ::1 (Localhost)# 192.168.0.0/16 (Your internal network)# fe80::/10 (IPv6 Link-Local)ignoreip = 127.0.0.1/8 ::1 192.168.0.0/16 fe80::/10
#Set nftables as the default backend for all jailsbanaction = nftables-multiport
banaction_allports = nftables-allports
# Zoraxy Jail[zoraxy-strict]enabled = true
port = http,https
filter = zoraxy-strict
logpath = /srv/zoraxy/log/zr_2026-*.log
# This line excludes your internal IPv4 and IPv6 rangesignoreip = 127.0.0.1/8 ::1 192.168.0.0/16 fe80::/10
##### One strike and you're out for specific exploit patternsmaxretry = 1
findtime = 1h
bantime = 24h
[recidive]enabled = true
logpath = /var/log/fail2ban.log
filter = recidive
#### If an IP gets banned 3 times in 2 days, ban them for 1 weekmaxretry = 3
findtime = 2d
bantime = 7d
# Use allports for recidive to completely kick them off the serverbanaction = nftables-allports
WAN access is provided by Cloudflare tunnel directly on the Proxy LXC running under Proxmox VE 9.1
I decided to go this way rather than opening a port on my router although that maybe would have caught the IP address
Cloudflare analytics is reporting intercepted threats - so only 1 got through to the proxy.
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello,
Please consider this feedback
The following script was built and run against the logs
Zoraxy Forensic Report
The resulting report is here after the output of the script was put through the AI.
Zoraxy Forensic Analysis Post
Fail2ban
Can someone help verify this for me please
Here is the finalized content for /etc/fail2ban/filter.d/zoraxy-strict.conf
Draft jail
WAN access is provided by Cloudflare tunnel directly on the Proxy LXC running under Proxmox VE 9.1
I decided to go this way rather than opening a port on my router although that maybe would have caught the IP address
Cloudflare analytics is reporting intercepted threats - so only 1 got through to the proxy.
I am very happy with your work. Thanks again.
Beta Was this translation helpful? Give feedback.
All reactions