A utility designed to analyze UFW logs and report IP addresses blocked by the firewall to the AbuseIPDB database.
To prevent excessive reporting of the same IP address within a short period, the tool uses a temporary cache file to track previously reported IP addresses.
This project was originally written in Bash but has been rewritten in Node.js. All my integration tools are now written in Node, hence this change. If you were using the old version, please uninstall it as it will no longer be supported.
β If you like this repository or find it useful, I'd greatly appreciate it if you could give it a star. Many thanks!
Also, check this out: sefinek/Cloudflare-WAF-To-AbuseIPDB
Important
- If you'd like to make changes to any files in this repository, please start by creating a public fork.
- According to AbuseIPDB's policy, UDP traffic should not be reported!
- Node.js + npm
- PM2 (
npm i pm2 -g
) - Git
- Ubuntu Server or Debian
- Easy Configuration β The
config.js
file allows for quick and simple customization. - Simple Installer β Enables fast and seamless integration deployment.
- Self-IP Protection (IPv4 & IPv6) β The script will never report an IP address belonging to you or your server, even if you use a dynamic IP.
- Discord Webhooks Integration:
- Important notifications.
- Alerts for script errors.
- Daily summaries of reported IP addresses.
- Automatic Updates β The script regularly fetches and applies the latest updates. If you want, you can disable it, of course.
bash <(curl -fsS https://raw.githubusercontent.com/sefinek/UFW-AbuseIPDB-Reporter/main/install.sh)
bash <(wget -qO- https://raw.githubusercontent.com/sefinek/UFW-AbuseIPDB-Reporter/main/install.sh)
sudo apt install -y curl
curl -fsSL https://deb.nodesource.com/setup_22.x -o nodesource_setup.sh
sudo -E bash nodesource_setup.sh && sudo apt install -y nodejs
sudo add-apt-repository ppa:git-core/ppa
sudo apt update && sudo apt -y install git
sudo apt update && sudo apt upgrade
cd ~
git clone https://github.com/sefinek/UFW-AbuseIPDB-Reporter.git
cd UFW-AbuseIPDB-Reporter
npm install
cp config.default.js config.js
sudo chmod 644 /var/log/ufw.log
node .
^C
npm install pm2 -g
sudo mkdir /var/log/ufw-abuseipdb
sudo chown $USER:$USER /var/log/ufw-abuseipdb -R
pm2 start
pm2 startup
[Paste the command generated by pm2 startup]
pm2 save
ποΈ Uninstall the deprecated version if you have it
sudo systemctl stop abuseipdb-ufw.service && sudo systemctl disable abuseipdb-ufw.service
sudo rm /etc/systemd/system/abuseipdb-ufw.service
sudo systemctl daemon-reload
sudo rm -r /usr/local/bin/UFW-AbuseIPDB-Reporter
After a successful installation, the script will run continuously in the background, monitoring UFW logs and automatically reporting IP addresses.
Servers are constantly scanned by bots, usually looking for security vulnerabilities and similar weaknesses. So don't be surprised if the number of reports sent to AbuseIPDB exceeds a thousand the next day.
pm2 logs ufw-abuseipdb
Blocked by UFW on homeserver1 [80/tcp]
Source port: 23639
TTL: 247
Packet length: 40
TOS: 0x00
This report was generated by:
https://github.com/sefinek/UFW-AbuseIPDB-Reporter
Blocked by UFW on homeserver1 [30049/tcp]. Generated by: https://github.com/sefinek/UFW-AbuseIPDB-Reporter
If you want to contribute to the development of this project, feel free to create a new Pull request. I will definitely appreciate it!
π GPL-3.0 License
Copyright 2024-2025 Β© by Sefinek. All rights reserved.