Toolverse
All skills

fail2ban-reporter

by openclaw

Auto-report fail2ban banned IPs to AbuseIPDB and notify via Telegram. Use when monitoring server security, reporting attackers, or checking banned IPs. Watches fail2ban for new bans, reports them to AbuseIPDB, and sends alerts.

Installation

Pick a client and clone the repository into its skills directory.

Installation

Quick info

Author
openclaw
Category
Security
Views
1

About this skill

Auto-report fail2ban banned IPs to AbuseIPDB and notify via Telegram. Use when monitoring server security, reporting attackers, or checking banned IPs. Watches fail2ban for new bans, reports them to AbuseIPDB, and sends alerts.

How to use

  1. Utwórz bezpłatne konto na AbuseIPDB (https://www.abuseipdb.com/account/api) i pobierz klucz API.

  2. Zapisz klucz API w menedżerze haseł poleceniem pass insert abuseipdb/api-key, a następnie wklej swój klucz.

  3. Uruchom skrypt instalacji: bash {baseDir}/scripts/install.sh. Skrypt skonfiguruje automatyczne raportowanie — od tego momentu każde nowe blokowanie IP przez fail2ban będzie natychmiast zgłaszane do AbuseIPDB i wysyłane na Telegram.

  4. Aby ręcznie raportować wszystkie aktualnie zablokowane adresy IP, uruchom bash {baseDir}/scripts/report-banned.sh.

  5. Aby sprawdzić statystyki banów, użyj bash {baseDir}/scripts/stats.sh. Aby weryfikować konkretny adres IP, uruchom bash {baseDir}/scripts/check-ip.sh <ip>.

  6. Jeśli chcesz wyłączyć automatyczne raportowanie, wykonaj bash {baseDir}/scripts/uninstall.sh.

Related skills

architect-review

by sickn33

Master software architect specializing in modern architecture patterns, clean architecture, microservices, event-driven systems, and DDD. Reviews system designs and code changes for architectural integrity, scalability, and maintainability. Use PROACTIVELY for architectural

Security
2773

reverse-engineering-tools

by gmh5225

Guide for reverse engineering tools and techniques used in game security research. Use this skill when working with debuggers, disassemblers, memory analysis tools, binary analysis, or decompilers for game security research.

Security
3168

google-analytics

by davila7

Analyze Google Analytics data, review website performance metrics, identify traffic patterns, and suggest data-driven improvements. Use when the user asks about analytics, website metrics, traffic analysis, conversion rates, user behavior, or performance optimization.

Security
1260

youtube-watcher

by openclaw

Fetch and read transcripts from YouTube videos. Use when you need to summarize a video, answer questions about its content, or extract information from it.

Security
2231

obsidian

by gapmiss

Comprehensive guidelines for Obsidian.md plugin development including all 27 ESLint rules, TypeScript best practices, memory management, API usage (requestUrl vs fetch), UI/UX standards, and submission requirements. Use when working with Obsidian plugins, main.ts files,

Security
14111

python-expert

by Shubhamsaboo

Senior Python developer expertise for writing clean, efficient, and well-documented code.\nUse when: writing Python code, optimizing Python scripts, reviewing Python code for best practices,\ndebugging Python issues, implementing type hints, or when user mentions Python, PEP 8,

Security
2777