{"id":6825,"date":"2022-08-08T10:23:29","date_gmt":"2022-08-08T04:53:29","guid":{"rendered":"https:\/\/pheonixsolutions.com\/blog\/?p=6825"},"modified":"2022-08-08T10:26:26","modified_gmt":"2022-08-08T04:56:26","slug":"how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server","status":"publish","type":"post","link":"https:\/\/pheonixsolutions.com\/blog\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\/","title":{"rendered":"<strong>How to Install and Configure Fail2ban on Ubuntu 18.04 Server<\/strong>"},"content":{"rendered":"\n<p>Fail2ban is an intrusion detection system that scans the log files to find malicious attacks on your servers. Fail2ban updates firewall rules on its own to block the IP addresses which are trying to exploit the server.<br><\/p>\n\n\n\n<p><strong>Prerequisite<\/strong><\/p>\n\n\n\n<p>A system running Ubuntu 18.04 with a user account with sudo privileges<\/p>\n\n\n\n<p><strong>Implementation<\/strong><\/p>\n\n\n\n<p>Step 1: SSH the server<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>$ ssh user@ip<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Step 2: Get the newest versions of the packages and their dependencies<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>$sudo apt-get update<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Step 3: Install Fail2ban<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>$sudo apt-get install fail2ban<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Step 4: To configure fail2ban use custom configuration file &#8216;jail.local&#8217; from &#8216;jail.conf&#8217;<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>$sudo cp \/etc\/fail2ban\/jail.conf \/etc\/fail2ban\/jail.local<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Step 5: Edit the custom configuration file as mentioned to filter based on the sshd service<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>$ vi \/etc\/fail2ban\/jail.local<br><br>=====<br><strong>[sshd]<\/strong><br>enabled = true<br>port = 22<br>filter = sshd<br>logpath = \/var\/log\/auth.log<br>bantime = 10m<br>findtime = 10m<br>maxretry = 5<br><br>=====<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><br>(I) Bantime &#8211; The time that an IP address is banned before it can be allowed to access the service again<\/p>\n\n\n\n<p><br>(II) Findtime &#8211; The maximum amount of time fail2ban should wait before banning an IP address if it has generated the maximum retries allowed for a particular service<\/p>\n\n\n\n<p>(III) Maxretry &#8211; The number of failures that an IP should generate before it is banned<\/p>\n\n\n\n<p>Step 6: Check whether fail2ban is blocking the IP address by the below command<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>$fail2ban-client status sshd<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><br>Step 7: If the configuration is correct, Then the output should be as mentioned&nbsp; below<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Output<br>Status for the jail: sshd<br>|- Filter<br>| |- Currently failed: 11<br>| |- Total failed: 93<br>| `- File list: \/var\/log\/auth.log<br>`- Actions<br>|- Currently banned: 11<br>|- Total banned: 22<br>`- Banned IP list: *.*.*.*<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>We will get the list of IP addresses banned in the &#8216;Banned IP list&#8217;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fail2ban is an intrusion detection system that scans the log files to find malicious attacks on your servers. Fail2ban updates firewall rules on its own to block the IP addresses which are trying to exploit the server. Prerequisite A system running Ubuntu 18.04 with a user account with sudo privileges&hellip; <a href=\"https:\/\/pheonixsolutions.com\/blog\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\/\" class=\"more-link read-more\" rel=\"bookmark\">Continue Reading <span class=\"screen-reader-text\"><strong>How to Install and Configure Fail2ban on Ubuntu 18.04 Server<\/strong><\/span><i class=\"fa fa-arrow-right\"><\/i><\/a><\/p>\n","protected":false},"author":495,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[282],"tags":[348],"class_list":{"0":"post-6825","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"hentry","6":"category-ubuntu","7":"tag-fail2ban","8":"h-entry","10":"h-as-article"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pheonix Solutions - We Empower Your Business Growth<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pheonixsolutions.com\/blog\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pheonix Solutions - We Empower Your Business Growth\" \/>\n<meta property=\"og:description\" content=\"Fail2ban is an intrusion detection system that scans the log files to find malicious attacks on your servers. Fail2ban updates firewall rules on its own to block the IP addresses which are trying to exploit the server. Prerequisite A system running Ubuntu 18.04 with a user account with sudo privileges&hellip; Continue Reading How to Install and Configure Fail2ban on Ubuntu 18.04 Server\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pheonixsolutions.com\/blog\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\/\" \/>\n<meta property=\"og:site_name\" content=\"PHEONIXSOLUTIONS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-08T04:53:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-08T04:56:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/09\/PX2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3837\" \/>\n\t<meta property=\"og:image:height\" content=\"2540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"meenakshi k\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pheonixsolution\" \/>\n<meta name=\"twitter:site\" content=\"@pheonixsolution\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"meenakshi k\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\\\/\"},\"author\":{\"name\":\"meenakshi k\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/d573de3a2c02cbeca49e90581a88b98f\"},\"headline\":\"How to Install and Configure Fail2ban on Ubuntu 18.04 Server\",\"datePublished\":\"2022-08-08T04:53:29+00:00\",\"dateModified\":\"2022-08-08T04:56:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\\\/\"},\"wordCount\":295,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\"},\"keywords\":[\"fail2ban\"],\"articleSection\":[\"Ubuntu\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\\\/\",\"name\":\"Pheonix Solutions - We Empower Your Business Growth\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#website\"},\"datePublished\":\"2022-08-08T04:53:29+00:00\",\"dateModified\":\"2022-08-08T04:56:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Install and Configure Fail2ban on Ubuntu 18.04 Server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\",\"name\":\"Pheonix Solutions\",\"description\":\"We Empower Your Business Growth\",\"publisher\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\",\"name\":\"PheonixSolutions\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/logo.png\",\"width\":454,\"height\":300,\"caption\":\"PheonixSolutions\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PheonixSolutions-209942982759387\\\/\",\"https:\\\/\\\/x.com\\\/pheonixsolution\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/d573de3a2c02cbeca49e90581a88b98f\",\"name\":\"meenakshi k\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0a3923b9a31a41d8de2fdc928e514efe879fe17b6e5d2814b7f81ed2356e5?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0a3923b9a31a41d8de2fdc928e514efe879fe17b6e5d2814b7f81ed2356e5?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0a3923b9a31a41d8de2fdc928e514efe879fe17b6e5d2814b7f81ed2356e5?s=96&r=g\",\"caption\":\"meenakshi k\"},\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/author\\\/meenakshi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pheonix Solutions - We Empower Your Business Growth","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pheonixsolutions.com\/blog\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\/","og_locale":"en_US","og_type":"article","og_title":"Pheonix Solutions - We Empower Your Business Growth","og_description":"Fail2ban is an intrusion detection system that scans the log files to find malicious attacks on your servers. Fail2ban updates firewall rules on its own to block the IP addresses which are trying to exploit the server. Prerequisite A system running Ubuntu 18.04 with a user account with sudo privileges&hellip; Continue Reading How to Install and Configure Fail2ban on Ubuntu 18.04 Server","og_url":"https:\/\/pheonixsolutions.com\/blog\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\/","og_site_name":"PHEONIXSOLUTIONS","article_publisher":"https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/","article_published_time":"2022-08-08T04:53:29+00:00","article_modified_time":"2022-08-08T04:56:26+00:00","og_image":[{"width":3837,"height":2540,"url":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/09\/PX2.png","type":"image\/png"}],"author":"meenakshi k","twitter_card":"summary_large_image","twitter_creator":"@pheonixsolution","twitter_site":"@pheonixsolution","twitter_misc":{"Written by":"meenakshi k","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\/#article","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\/"},"author":{"name":"meenakshi k","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/person\/d573de3a2c02cbeca49e90581a88b98f"},"headline":"How to Install and Configure Fail2ban on Ubuntu 18.04 Server","datePublished":"2022-08-08T04:53:29+00:00","dateModified":"2022-08-08T04:56:26+00:00","mainEntityOfPage":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\/"},"wordCount":295,"commentCount":0,"publisher":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#organization"},"keywords":["fail2ban"],"articleSection":["Ubuntu"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pheonixsolutions.com\/blog\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\/","url":"https:\/\/pheonixsolutions.com\/blog\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\/","name":"Pheonix Solutions - We Empower Your Business Growth","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#website"},"datePublished":"2022-08-08T04:53:29+00:00","dateModified":"2022-08-08T04:56:26+00:00","breadcrumb":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pheonixsolutions.com\/blog\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-install-and-configure-fail2ban-on-ubuntu-18-04-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pheonixsolutions.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Install and Configure Fail2ban on Ubuntu 18.04 Server"}]},{"@type":"WebSite","@id":"https:\/\/pheonixsolutions.com\/blog\/#website","url":"https:\/\/pheonixsolutions.com\/blog\/","name":"Pheonix Solutions","description":"We Empower Your Business Growth","publisher":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pheonixsolutions.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pheonixsolutions.com\/blog\/#organization","name":"PheonixSolutions","url":"https:\/\/pheonixsolutions.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/12\/logo.png","contentUrl":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/12\/logo.png","width":454,"height":300,"caption":"PheonixSolutions"},"image":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/","https:\/\/x.com\/pheonixsolution"]},{"@type":"Person","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/person\/d573de3a2c02cbeca49e90581a88b98f","name":"meenakshi k","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/17c0a3923b9a31a41d8de2fdc928e514efe879fe17b6e5d2814b7f81ed2356e5?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/17c0a3923b9a31a41d8de2fdc928e514efe879fe17b6e5d2814b7f81ed2356e5?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/17c0a3923b9a31a41d8de2fdc928e514efe879fe17b6e5d2814b7f81ed2356e5?s=96&r=g","caption":"meenakshi k"},"url":"https:\/\/pheonixsolutions.com\/blog\/author\/meenakshi\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p7F4uM-1M5","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/6825","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/users\/495"}],"replies":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/comments?post=6825"}],"version-history":[{"count":0,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/6825\/revisions"}],"wp:attachment":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/media?parent=6825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/categories?post=6825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/tags?post=6825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}