WP fail2ban Blocklist is a collaborative preemptive blocklist for WordPress.
There are many plugins that use a database to check for malicious IPs after they connect, and of course fail2ban
stops repeated attacks, but what if bad IPs could be blocked before they attack?
By working collaboratively – sharing attack data – WP fail2ban Blocklist does exactly that.
The Blocklist Network Service (BNS) collects attack data from participating sites, performs some analytical magic, and sends back a list of IPs that are attacking sites now but haven’t yet attacked that site. In other words, each site periodically gets a unique list of IPs to block preemptively.
The BNS doesn’t collect personal data, and bots don’t have rights.
That said, the BNS only collects the minimum data required (time, IP, event), and only for IPs that have behaved maliciously.
Of course, it is possible that some data is generated by people behaving maliciously, but the BNS has no way to differentiate – and nor should it: an attack is an attack.
To work, the BNS must know:
Freemius already provides all these, and WP fail2ban already uses Freemius; why reinvent the wheel?
Therefore, unlike the core WP fail2ban plugin, you must opt into Freemius for the blocklist to work.
/wp-json/wp-fail2ban/v1/blocklist
maxretry = 1
in your wordpress‑hard
or wpf2b‑blocklist‑hard
jail; the add-on will not work otherwise.Details of the configuration steps can be found here.
WP_FAIL2BAN_ADDON_BLOCKLIST_DEBUG
.WP_FAIL2BAN_ADDON_BLOCKLIST_DEBUG_TRY_ALL_KEYS
.WPf2b
release.wpf2b-
instead of wordpress-
.