An integration tool designed to analyze UFW logs and report IP addresses blocked by the firewall to the AbuseIPDB database.
To prevent excessive reporting of the same IP address within a short time period, the tool uses a temporary cache file to track previously reported IP addresses.
⭐ If you like this repository or find it useful, I'd greatly appreciate it if you could give it a star. Many thanks!
Also, check this out: sefinek/Cloudflare-WAF-To-AbuseIPDB
Important
- If you'd like to make changes to any files in this repository, please start by creating a public fork.
- According to AbuseIPDB's policy, UDP traffic should not be reported!
- Node.js + npm
- PM2 (
npm i -g pm2
) - Git
- Linux (Ubuntu or Debian)
- Easy Configuration – The
config.js
file allows for quick and simple configuration. - Simple Installer – Enables fast and seamless integration deployment.
- Bulk Reporting Support – If the script encounters a rate limit, it will start buffering collected IPs and send a bulk report.
- Self-IP Protection (IPv4 & IPv6) – The script will never report IP addresses belonging to you or your server, even if you're using a dynamic IP address.
- Local IP Filtering – Local IP addresses will never be reported.
- Discord Webhooks Integration:
- Critical notifications
- Script error alerts
- Daily summaries of reported IPs
- Automatic Updates – The script regularly fetches and applies the latest updates. You can disable this feature if you'd prefer.
bash <(curl -fsS https://raw.githubusercontent.com/sefinek/UFW-AbuseIPDB-Reporter/main/install.sh)
bash <(wget -qO- https://raw.githubusercontent.com/sefinek/UFW-AbuseIPDB-Reporter/main/install.sh)
sudo apt install -y curl && \
curl -fsSL https://deb.nodesource.com/setup_22.x | sudo -E bash - && \
sudo apt install -y nodejs
sudo add-apt-repository -y ppa:git-core/ppa && \
sudo apt update && sudo apt install -y git
sudo apt update && sudo apt upgrade
cd ~
git clone --recurse-submodules https://github.com/sefinek/UFW-AbuseIPDB-Reporter.git
cd UFW-AbuseIPDB-Reporter
npm install
cp config.default.js config.js
sudo chmod 644 /var/log/ufw.log
npm install -g pm2
sudo mkdir -p /var/log/ufw-abuseipdb
sudo chown -R "$USER":"$USER" /var/log/ufw-abuseipdb
pm2 start .
eval "$(pm2 startup | grep sudo)"
pm2 save
After a successful installation, the script will run continuously in the background, monitoring UFW logs and automatically reporting IP addresses.
Servers are constantly scanned by bots, usually looking for security vulnerabilities and similar weaknesses. So don't be surprised if the number of reports sent to AbuseIPDB exceeds a thousand the next day.
pm2 logs ufw-abuseipdb
Blocked by UFW on homeserver1 [80/tcp]
Source port: 23639
TTL: 247
Packet length: 40
TOS: 0x00
This report was generated by:
https://github.com/sefinek/UFW-AbuseIPDB-Reporter
Blocked by UFW on homeserver1 [30049/tcp]. Generated by: https://github.com/sefinek/UFW-AbuseIPDB-Reporter
If you want to contribute to the development of this project, feel free to create a new Pull request. I will definitely appreciate it!
Copyright 2024-2025 © by Sefinek. All rights reserved.