fail2ban (security/fail2ban) Add to my watchlist

Fail2ban protects computer against brute-force attacks

Fail2ban scans log files (e.g. /var/log/apache/error_log) and bans IPs that show the malicious signs -- too many password failures, seeking for exploits, etc. Generally Fail2Ban then used to update firewall rules to reject the IP addresses for a specified amount of time, although any arbitrary other action (e.g. sending an email, or ejecting CD-ROM tray) could also be configured. Out of the box Fail2Ban comes with filters for various services (apache, curier, ssh, etc).

Version: 0.9.4 License: GPL-2+ GitHub
Maintainers No Maintainer
Categories security python
Platforms darwin
Variants -

"fail2ban" depends on

lib (1)
build (1)

Ports that depend on "fail2ban"

No ports

Port notes

Next step is to configure fail2ban.
Start to read:
and create your own fail2ban.local and jail.local

Start/stop fail2ban with: sudo port [un]load fail2ban

More info at A startup item has been generated that will aid in starting fail2ban with launchd. It is disabled by default. Execute the following command to start it, and to cause it to launch at startup:

sudo port load fail2ban

Port Health:

Loading Port Health

Installations (30 days)


Requested Installations (30 days)


Livecheck error

Error: cannot check if fail2ban was updated (regex didn't match)

last updated: 15 hours ago