Shell script para bloquear IPs no autorizadas

Fichero block_ips.sh :

#!/bin/bash
###########################################################
#       Autor: Miguel Carretas Perulero                   #
#       Description: This script block unauthorized IPs   #
#       and prevent posible attacks                       #
#                                                         #
###########################################################
file=bad_ips.txt
hosts_allow=permited_hosts
# First, it checks the file that saves the failed logins, filtering through public IPv4 and redirecting the output to a file.
utmpdump /var/log/btmp | egrep -v "root" | grep -oE '([0-9]{1,3}\.){3}[0-9]{1,3}' | uniq > $file
cat /var/log/messages | grep "FINAL_REJECT" | awk '{print $10}' | cut -d "=" -f 2 | uniq  >> $file

filter=$file
cat $filter | uniq > $file

echo "********** Start spam IP's block program *************"
echo -e

echo "Checking existing firewalls rules..."
echo -e

# We check existing rules to NOT overwrite them

firewall_rules="rules.txt"
echo "" > $firewall_rules
iptables -L -n > $firewall_rules

# First, permit allowed ipv4

while read line;
do
        firewall-cmd --permanent --remove-rich-rule="rule family='ipv4' source address='$line' reject"
        firewall-cmd --permanent --add-rich-rule="rule family='ipv4' source address='$line' accept"
done < $hosts_allow

# Initialize "newip" variable
newip=0

while read line;
do
        if [ `cat $firewall_rules | grep $line | grep "REJECT" | wc -l` -eq 0  ]; then # If the public IPv4 is not denied, we add the new rule
        firewall-cmd --permanent --add-rich-rule="rule family='ipv4' source address='$line' reject"
        let "newip++" # We add +1 to the variable "newip" for each interaction of the while loop
        else
        echo "The IP: $line has already been blocked beforehand." # If public IPv4 is already denied, we display this message
        fi
done < $file

# Remove allowed ipv4 from rejected rules

while read line;
do
        firewall-cmd --permanent --remove-rich-rule="rule family='ipv4' source address='$line' reject"
done < $hosts_allow

echo -e
echo "Restarting firewallcmd service"
systemctl restart firewalld.service

# Here we show how many new IPv4s have been blocked
echo -e
echo "$newip IP's blocked"
echo -e

# Here we show how many IPv4s are blocked in total

totalips=`cat $file | wc -l`
echo -e
echo "$totalips bad IP's register"

echo "********** The program is finished *************"

Fichero /etc/cron.d/block_ips:

# /etc/cron.d/block_ips
30 0 * * * root /root/scripts/block_ips.sh >/dev/null 2>&1

Readme:

The file "permited_hosts" must be located in the same directory as the script itself.

In this file is that we will define the IP addresses that will always be able to access our machine.

It is very important to include in this file the own public IP of our machine, or in its defect, the public IP of the router / firewall that serves as connection with Internet.

Enlace a ficheros en github:

https://github.com/miguelcarretas/spam-ips-block

Espero que os sirva de utilidad.

Saludos Sys@dmis! 🙂

Deja un comentario


El periodo de verificación de reCAPTCHA ha caducado. Por favor, recarga la página.