failregex = {"reqId":".*","level":2,"time":".*","remoteAddr":".*","user":"--","app":"core","method":".*","message":"Login failed: '.*' \(Remote IP: ''\)"}
[Definition]
failregex={.*Login failed: \'.*\' \(Remote IP: \'<HOST>\'\)"}
ignoreregex =
sudo fail2ban-client status owncloud
Status for the jail: owncloud
|- Filter
| |- Currently failed: 0
| |- Total failed: 9
| `- File list: /var/log/owncloud-acces.log
`- Actions
|- Currently banned: 1
|- Total banned: 2
`- Banned IP list: 192.168.1.166
arbrspb@nas:~$
arbrspb@nas:~$ sudo fail2ban-regex /var/log/owncloud-acces.log /etc/fail2ban/filter.d/ownCloud.conf -v
Running tests
=============
Use failregex filter file : ownCloud, basedir: /etc/fail2ban
Use log file : /var/log/owncloud-acces.log
Use encoding : UTF-8
Results
=======
Failregex: 90 total
|- #) [# of hits] regular expression
| 1) [90] {.*Login failed: \'.*\' \(Remote IP: \'<HOST>\'\)"}
| 192.168.1.166 Sun Aug 18 17:36:49 2019
| 192.168.1.166 Sun Aug 18 17:37:16 2019
| 192.168.1.166 Sun Aug 18 17:37:22 2019
| 192.168.1.166 Sun Aug 18 19:28:04 2019
| 192.168.1.166 Sun Aug 18 19:28:08 2019
| 192.168.1.166 Sun Aug 18 19:28:34 2019
| 192.168.1.166 Sun Aug 18 19:28:36 2019
| 192.168.1.166 Sun Aug 18 19:28:37 2019
| 192.168.1.166 Sun Aug 18 19:28:38 2019
| 192.168.1.166 Sun Aug 18 19:28:39 2019
| 192.168.1.166 Sun Aug 18 19:28:40 2019
| 192.168.1.166 Sun Aug 18 19:28:42 2019
| 192.168.1.166 Sun Aug 18 20:05:06 2019
| 192.168.1.166 Sun Aug 18 20:05:17 2019
| 192.168.1.166 Sun Aug 18 20:05:24 2019
| 192.168.1.166 Sun Aug 18 20:05:26 2019
| 192.168.1.166 Sun Aug 18 20:05:31 2019
| 192.168.1.166 Sun Aug 18 20:05:40 2019
| 192.168.1.166 Sun Aug 18 20:05:43 2019
| 192.168.1.166 Sun Aug 18 20:37:25 2019
| 192.168.1.166 Sun Aug 18 20:37:27 2019
| 192.168.1.166 Sun Aug 18 20:37:28 2019
| 192.168.1.166 Sun Aug 18 20:37:29 2019
| 192.168.1.166 Sun Aug 18 20:37:29 2019
| 192.168.1.166 Sun Aug 18 20:37:31 2019
| 192.168.1.166 Sun Aug 18 20:37:32 2019
| 192.168.1.166 Sun Aug 18 20:37:33 2019
| 192.168.1.166 Sun Aug 18 21:02:35 2019
| 192.168.1.166 Sun Aug 18 21:02:37 2019
| 192.168.1.166 Sun Aug 18 21:02:38 2019
| 192.168.1.166 Sun Aug 18 21:02:39 2019
| 192.168.1.166 Sun Aug 18 21:02:41 2019
| 192.168.1.166 Sun Aug 18 21:02:42 2019
| 192.168.1.166 Sun Aug 18 21:02:44 2019
| 192.168.1.166 Sun Aug 18 21:02:46 2019
| 192.168.1.166 Sun Aug 18 21:04:17 2019
| 192.168.1.166 Sun Aug 18 21:04:18 2019
| 192.168.1.166 Sun Aug 18 21:04:19 2019
| 192.168.1.166 Sun Aug 18 21:04:20 2019
| 192.168.1.166 Sun Aug 18 21:04:21 2019
| 192.168.1.166 Sun Aug 18 21:04:22 2019
| 192.168.1.166 Sun Aug 18 21:04:23 2019
| 192.168.1.166 Sun Aug 18 21:04:24 2019
| 192.168.1.166 Sun Aug 18 21:12:02 2019
| 192.168.1.166 Sun Aug 18 21:12:04 2019
| 192.168.1.166 Sun Aug 18 21:12:05 2019
| 192.168.1.166 Sun Aug 18 21:12:06 2019
| 192.168.1.166 Sun Aug 18 21:12:07 2019
| 192.168.1.166 Sun Aug 18 21:12:08 2019
| 192.168.1.166 Sun Aug 18 21:12:10 2019
| 192.168.1.166 Sun Aug 18 21:12:11 2019
| 192.168.1.166 Sun Aug 18 21:12:37 2019
| 192.168.1.166 Sun Aug 18 21:13:25 2019
| 192.168.1.166 Sun Aug 18 21:13:26 2019
| 192.168.1.166 Sun Aug 18 21:13:27 2019
| 192.168.1.166 Sun Aug 18 21:13:28 2019
| 192.168.1.166 Sun Aug 18 21:13:29 2019
| 192.168.1.166 Sun Aug 18 21:13:30 2019
| 192.168.1.166 Sun Aug 18 21:13:32 2019
| 192.168.1.166 Sun Aug 18 21:24:10 2019
| 192.168.1.166 Sun Aug 18 23:28:43 2019
| 192.168.1.166 Sun Aug 18 23:28:44 2019
| 192.168.1.166 Sun Aug 18 23:28:45 2019
| 192.168.1.166 Sun Aug 18 23:28:46 2019
| 192.168.1.166 Sun Aug 18 23:28:47 2019
| 192.168.1.166 Sun Aug 18 23:28:48 2019
| 192.168.1.166 Sun Aug 18 23:28:49 2019
| 192.168.1.166 Sun Aug 18 23:28:50 2019
| 192.168.1.166 Sun Aug 18 23:36:51 2019
| 192.168.1.166 Sun Aug 18 23:36:56 2019
| 192.168.1.166 Sun Aug 18 23:54:12 2019
| 192.168.1.166 Sun Aug 18 23:54:18 2019
| 192.168.1.166 Sun Aug 18 23:54:19 2019
| 192.168.1.166 Sun Aug 18 23:55:42 2019
| 192.168.1.166 Sun Aug 18 23:55:53 2019
| 192.168.1.166 Sun Aug 18 23:55:54 2019
| 192.168.1.166 Sun Aug 18 23:55:55 2019
| 192.168.1.166 Sun Aug 18 23:55:56 2019
| 192.168.1.166 Sun Aug 18 23:55:58 2019
| 192.168.1.166 Sun Aug 18 23:55:59 2019
| 192.168.1.166 Sun Aug 18 23:56:00 2019
| 192.168.1.166 Tue Aug 20 00:05:15 2019
| 192.168.1.166 Tue Aug 20 00:06:09 2019
| 192.168.1.166 Tue Aug 20 00:06:27 2019
| 192.168.1.166 Tue Aug 20 00:06:29 2019
| 192.168.1.166 Tue Aug 20 00:06:30 2019
| 192.168.1.166 Tue Aug 20 00:06:31 2019
| 192.168.1.166 Tue Aug 20 00:06:32 2019
| 192.168.1.166 Tue Aug 20 00:06:34 2019
| 192.168.1.166 Tue Aug 20 00:06:35 2019
`-
Ignoreregex: 0 total
Date template hits:
|- [# of hits] date format
| [90] ExYear(?P<_sep>[-/.])Month(?P=_sep)Day(?:T| ?)24hour:Minute:Second(?:[.,]Microseconds)?(?:\s*Zone offset)?
| [0] {^LN-BEG}ExYear(?P<_sep>[-/.])Month(?P=_sep)Day(?:T| ?)24hour:Minute:Second(?:[.,]Microseconds)?(?:\s*Zone offset)?
| [0] {^LN-BEG}(?:DAY )?MON Day %k:Minute:Second(?:\.Microseconds)?(?: ExYear)?
| [0] {^LN-BEG}(?:DAY )?MON Day ExYear %k:Minute:Second(?:\.Microseconds)?
| [0] {^LN-BEG}Day(?P<_sep>[-/])Month(?P=_sep)(?:ExYear|ExYear2) %k:Minute:Second
| [0] {^LN-BEG}Day(?P<_sep>[-/])MON(?P=_sep)ExYear[ :]?24hour:Minute:Second(?:\.Microseconds)?(?: Zone offset)?
| [0] {^LN-BEG}Month/Day/ExYear:24hour:Minute:Second
| [0] {^LN-BEG}Month-Day-ExYear %k:Minute:Second(?:\.Microseconds)?
| [0] {^LN-BEG}Epoch
| [0] {^LN-BEG}ExYear2ExMonthExDay ?24hour:Minute:Second
| [0] {^LN-BEG}MON Day, ExYear 12hour:Minute:Second AMPM
| [0] {^LN-BEG}ExYearExMonthExDay(?:T| ?)Ex24hourExMinuteExSecond(?:[.,]Microseconds)?(?:\s*Zone offset)?
| [0] {^LN-BEG}(?:Zone name )?(?:DAY )?MON Day %k:Minute:Second(?:\.Microseconds)?(?: ExYear)?
| [0] {^LN-BEG}(?:Zone offset )?(?:DAY )?MON Day %k:Minute:Second(?:\.Microseconds)?(?: ExYear)?
| [0] {^LN-BEG}TAI64N
| [0] (?:DAY )?MON Day %k:Minute:Second(?:\.Microseconds)?(?: ExYear)?
| [0] (?:DAY )?MON Day ExYear %k:Minute:Second(?:\.Microseconds)?
| [0] Day(?P<_sep>[-/])Month(?P=_sep)(?:ExYear|ExYear2) %k:Minute:Second
| [0] Day(?P<_sep>[-/])MON(?P=_sep)ExYear[ :]?24hour:Minute:Second(?:\.Microseconds)?(?: Zone offset)?
| [0] Month/Day/ExYear:24hour:Minute:Second
| [0] Month-Day-ExYear %k:Minute:Second(?:\.Microseconds)?
| [0] Epoch
| [0] {^LN-BEG}24hour:Minute:Second
| [0] ^<Month/Day/ExYear2@24hour:Minute:Second>
| [0] ExYear2ExMonthExDay ?24hour:Minute:Second
| [0] MON Day, ExYear 12hour:Minute:Second AMPM
| [0] ^MON-Day-ExYear2 %k:Minute:Second
| [0] ExYearExMonthExDay(?:T| ?)Ex24hourExMinuteExSecond(?:[.,]Microseconds)?(?:\s*Zone offset)?
| [0] (?:Zone name )?(?:DAY )?MON Day %k:Minute:Second(?:\.Microseconds)?(?: ExYear)?
| [0] (?:Zone offset )?(?:DAY )?MON Day %k:Minute:Second(?:\.Microseconds)?(?: ExYear)?
| [0] TAI64N
`-
Lines: 90 lines, 0 ignored, 90 matched, 0 missed
[processed in 0.06 sec]
Chain INPUT (policy ACCEPT 14541473 packets, 932248138 bytes)
pkts bytes target prot opt in out source destination
# Fail2Ban filter for webmin
#
[INCLUDES]
before = common.conf
[Definition]
_daemon = webmin
failregex = ^%(__prefix_line)sNon-existent login as .+ from <HOST>\s*$
^%(__prefix_line)sInvalid login as .+ from <HOST>\s*$
ignoreregex =
# DEV Notes:
#
# pattern : webmin[15673]: Non-existent login as toto from 86.0.6.217
# webmin[29544]: Invalid login as root from 86.0.6.217
#
# Rule Author: Delvit Guillaume
[webmin-auth]
port = 10000
logpath = %(syslog_authpriv)s
backend = %(syslog_backend)s
# Fail2Ban configuration file
#
# Author: Cyril Jaquier
#
#
[INCLUDES]
before = iptables-common.conf
[Definition]
# Option: actionstart
# Notes.: command executed once at the start of Fail2Ban.
# Values: CMD
#
actionstart = <iptables> -N f2b-<name>
<iptables> -A f2b-<name> -j <returntype>
<iptables> -I <chain> -p <protocol> --dport <port> -j f2b-<name>
# Option: actionstop
# Notes.: command executed once at the end of Fail2Ban
# Values: CMD
#
actionstop = <iptables> -D <chain> -p <protocol> --dport <port> -j f2b-<name>
<iptables> -F f2b-<name>
<iptables> -X f2b-<name>
# Option: actioncheck
# Notes.: command executed once before each actionban command
# Values: CMD
#
actioncheck = <iptables> -n -L <chain> | grep -q 'f2b-<name>[ \t]'
# Option: actionban
# Notes.: command executed when banning an IP. Take care that the
# command is executed with Fail2Ban user rights.
# Tags: See jail.conf(5) man page
# Values: CMD
#
actionban = <iptables> -I f2b-<name> 1 -s <ip> -j <blocktype>
# Option: actionunban
# Notes.: command executed when unbanning an IP. Take care that the
# command is executed with Fail2Ban user rights.
# Tags: See jail.conf(5) man page
# Values: CMD
#
actionunban = <iptables> -D f2b-<name> -s <ip> -j <blocktype>
[Init]
logLevel = DEBUG
logtarget = /var/log/fail2ban.log
2019-08-20 21:26:31,218 fail2ban.jail [16029]: INFO Creating new jail 'nginx-nokiddies'
2019-08-20 21:26:31,218 fail2ban.jail [16029]: INFO Jail 'nginx-nokiddies' uses poller
2019-08-20 21:26:31,219 fail2ban.jail [16029]: INFO Initiated 'polling' backend
[DEFAULT]
ignoreip = 127.0.0.1/8
ignorecommand =
bantime = 600
findtime = 600
maxretry = 3
[nginx-nokiddies]
enabled = true
filter = nginx-nokiddies
port = http,https
logpath = /var/log/nginx*/*access.log
action = iptables-multiport[name=NiKiddies, port="http,https"]
findtime = 3600
bantime = -1
maxretry = 2
2019-08-20 21:59:31,002 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 48
2019-08-20 21:59:31,003 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 48
2019-08-20 21:59:31,003 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 48
2019-08-20 21:59:31,003 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x100 name=.fail2ban.log.swp wd=1 >
2019-08-20 21:59:31,004 fail2ban.filterpyinotify[10213]: DEBUG Ignoring creation of /var/log/.fail2ban.log.swp we do not monitor
2019-08-20 21:59:31,003 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x100 name=.fail2ban.log.swp wd=1 >
2019-08-20 21:59:31,004 fail2ban.filterpyinotify[10213]: DEBUG Ignoring creation of /var/log/.fail2ban.log.swp we do not monitor
2019-08-20 21:59:31,003 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x100 name=.fail2ban.log.swp wd=1 >
2019-08-20 21:59:31,004 fail2ban.filterpyinotify[10213]: DEBUG Ignoring creation of /var/log/.fail2ban.log.swp we do not monitor
2019-08-20 22:00:08,952 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:00:08,953 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:00:08,954 fail2ban.filter [10213]: DEBUG Processing line with time:1566327608 and ip:192.168.1.166
2019-08-20 22:00:08,972 fail2ban.filter [10213]: INFO [owncloud] Found 192.168.1.166 - 2019-08-20 22:00:08
2019-08-20 22:00:08,973 fail2ban.failmanager [10213]: DEBUG Total # of detected failures: 36. Current failures from 1 IPs (IP:count): 192.168.1.166:1
2019-08-20 22:00:10,142 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:00:10,142 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:00:10,143 fail2ban.filter [10213]: DEBUG Processing line with time:1566327610 and ip:192.168.1.166
2019-08-20 22:00:10,144 fail2ban.filter [10213]: INFO [owncloud] Found 192.168.1.166 - 2019-08-20 22:00:10
2019-08-20 22:00:10,144 fail2ban.failmanager [10213]: DEBUG Total # of detected failures: 37. Current failures from 1 IPs (IP:count): 192.168.1.166:2
2019-08-20 22:00:11,117 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:00:11,118 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:00:11,119 fail2ban.filter [10213]: DEBUG Processing line with time:1566327611 and ip:192.168.1.166
2019-08-20 22:00:11,119 fail2ban.filter [10213]: INFO [owncloud] Found 192.168.1.166 - 2019-08-20 22:00:11
2019-08-20 22:00:11,119 fail2ban.failmanager [10213]: DEBUG Total # of detected failures: 38. Current failures from 1 IPs (IP:count): 192.168.1.166:3
2019-08-20 22:00:11,953 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:00:11,954 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:00:11,954 fail2ban.filter [10213]: DEBUG Processing line with time:1566327611 and ip:192.168.1.166
2019-08-20 22:00:11,954 fail2ban.filter [10213]: INFO [owncloud] Found 192.168.1.166 - 2019-08-20 22:00:11
2019-08-20 22:00:11,955 fail2ban.failmanager [10213]: DEBUG Total # of detected failures: 39. Current failures from 1 IPs (IP:count): 192.168.1.166:4
2019-08-20 22:00:12,834 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:00:12,835 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:00:12,836 fail2ban.filter [10213]: DEBUG Processing line with time:1566327612 and ip:192.168.1.166
2019-08-20 22:00:12,836 fail2ban.filter [10213]: INFO [owncloud] Found 192.168.1.166 - 2019-08-20 22:00:12
2019-08-20 22:00:12,836 fail2ban.failmanager [10213]: DEBUG Total # of detected failures: 40. Current failures from 1 IPs (IP:count): 192.168.1.166:5
2019-08-20 22:00:13,060 fail2ban.actions [10213]: NOTICE [owncloud] Ban 192.168.1.166
2019-08-20 22:00:13,060 fail2ban.actions [10213]: DEBUG Banned 1 / 5, 1 ticket(s) in 'owncloud'
2019-08-20 22:00:13,804 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:00:13,805 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:00:13,806 fail2ban.filter [10213]: DEBUG Processing line with time:1566327613 and ip:192.168.1.166
2019-08-20 22:00:13,806 fail2ban.filter [10213]: INFO [owncloud] Found 192.168.1.166 - 2019-08-20 22:00:13
2019-08-20 22:00:13,807 fail2ban.failmanager [10213]: DEBUG Total # of detected failures: 41. Current failures from 1 IPs (IP:count): 192.168.1.166:1
2019-08-20 22:00:14,730 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:00:14,730 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:00:14,731 fail2ban.filter [10213]: DEBUG Processing line with time:1566327614 and ip:192.168.1.166
2019-08-20 22:00:14,731 fail2ban.filter [10213]: INFO [owncloud] Found 192.168.1.166 - 2019-08-20 22:00:14
2019-08-20 22:00:14,731 fail2ban.failmanager [10213]: DEBUG Total # of detected failures: 42. Current failures from 1 IPs (IP:count): 192.168.1.166:2
2019-08-20 22:00:15,776 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:00:15,777 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:00:15,778 fail2ban.filter [10213]: DEBUG Processing line with time:1566327615 and ip:192.168.1.166
2019-08-20 22:00:15,778 fail2ban.filter [10213]: INFO [owncloud] Found 192.168.1.166 - 2019-08-20 22:00:15
2019-08-20 22:00:15,778 fail2ban.failmanager [10213]: DEBUG Total # of detected failures: 43. Current failures from 1 IPs (IP:count): 192.168.1.166:3
2019-08-20 22:00:16,710 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:00:16,711 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:00:16,711 fail2ban.filter [10213]: DEBUG Processing line with time:1566327616 and ip:192.168.1.166
2019-08-20 22:00:16,712 fail2ban.filter [10213]: INFO [owncloud] Found 192.168.1.166 - 2019-08-20 22:00:16
2019-08-20 22:00:16,712 fail2ban.failmanager [10213]: DEBUG Total # of detected failures: 44. Current failures from 1 IPs (IP:count): 192.168.1.166:4
2019-08-20 22:00:18,958 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 48
2019-08-20 22:00:18,958 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x100 name=.fail2ban.log.swp wd=1 >
2019-08-20 22:00:18,959 fail2ban.filterpyinotify[10213]: DEBUG Ignoring creation of /var/log/.fail2ban.log.swp we do not monitor
2019-08-20 22:00:18,959 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 48
2019-08-20 22:00:18,959 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x100 name=.fail2ban.log.swp wd=1 >
2019-08-20 22:00:18,959 fail2ban.filterpyinotify[10213]: DEBUG Ignoring creation of /var/log/.fail2ban.log.swp we do not monitor
2019-08-20 22:00:19,416 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 48
2019-08-20 22:00:19,417 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x100 name=.fail2ban.log.swp wd=1 >
2019-08-20 22:00:19,417 fail2ban.filterpyinotify[10213]: DEBUG Ignoring creation of /var/log/.fail2ban.log.swp we do not monitor
2019-08-20 22:01:02,502 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:01:02,502 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:29:37,289 fail2ban.filter [10213]: DEBUG Processing line with time:1566329377.0 and ip:192.168.1.166
2019-08-20 22:29:37,289 fail2ban.filter [10213]: INFO [webmin-auth] Found 192.168.1.166 - 2019-08-20 22:29:37
2019-08-20 22:29:37,289 fail2ban.failmanager [10213]: DEBUG Total # of detected failures: 15. Current failures from 1 IPs (IP:count): 192.168.1.166:1
2019-08-20 22:29:37,290 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:29:37,290 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:29:38,892 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:29:38,892 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:29:38,893 fail2ban.filter [10213]: DEBUG Processing line with time:1566329378.0 and ip:192.168.1.166
2019-08-20 22:29:38,894 fail2ban.filter [10213]: INFO [webmin-auth] Found 192.168.1.166 - 2019-08-20 22:29:38
2019-08-20 22:29:38,895 fail2ban.failmanager [10213]: DEBUG Total # of detected failures: 16. Current failures from 1 IPs (IP:count): 192.168.1.166:2
2019-08-20 22:29:38,900 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:29:38,900 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:29:41,599 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:29:41,600 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:29:41,602 fail2ban.filter [10213]: DEBUG Processing line with time:1566329381.0 and ip:192.168.1.166
2019-08-20 22:29:41,602 fail2ban.filter [10213]: INFO [webmin-auth] Found 192.168.1.166 - 2019-08-20 22:29:41
2019-08-20 22:29:41,603 fail2ban.failmanager [10213]: DEBUG Total # of detected failures: 17. Current failures from 1 IPs (IP:count): 192.168.1.166:3
2019-08-20 22:29:41,606 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:29:41,607 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:29:43,316 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:29:43,317 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:29:43,318 fail2ban.filter [10213]: DEBUG Processing line with time:1566329383.0 and ip:192.168.1.166
2019-08-20 22:29:43,318 fail2ban.filter [10213]: INFO [webmin-auth] Found 192.168.1.166 - 2019-08-20 22:29:43
2019-08-20 22:29:43,318 fail2ban.failmanager [10213]: DEBUG Total # of detected failures: 18. Current failures from 1 IPs (IP:count): 192.168.1.166:4
2019-08-20 22:29:43,319 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:29:43,319 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:29:46,022 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:29:46,023 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:29:46,024 fail2ban.filterpyinotify[10213]: DEBUG Event queue size: 16
2019-08-20 22:29:46,025 fail2ban.filterpyinotify[10213]: DEBUG <_RawEvent cookie=0 mask=0x2 name='' wd=2 >
2019-08-20 22:29:46,026 fail2ban.filter [10213]: DEBUG Processing line with time:1566329385.0 and ip:192.168.1.166
2019-08-20 22:29:46,027 fail2ban.filter [10213]: INFO [webmin-auth] Found 192.168.1.166 - 2019-08-20 22:29:45
2019-08-20 22:29:46,028 fail2ban.failmanager [10213]: DEBUG Total # of detected failures: 19. Current failures from 1 IPs (IP:count): 192.168.1.166:5
2019-08-20 22:29:46,417 fail2ban.actions [10213]: NOTICE [webmin-auth] Ban 192.168.1.166
2019-08-20 22:29:46,418 fail2ban.action [10213]: DEBUG iptables -w -n -L INPUT | grep -q 'f2b-webmin-auth[ \t]'
2019-08-20 22:29:46,431 fail2ban.utils [10213]: DEBUG 7f3280727570 -- returned successfully 0