Skip to content
IPBan Monitors failed logins and bans ip addresses on Windows, Linux and MAC. Highly configurable, lean and powerful. Download binaries from releases or here: -->
Branch: master
Clone or download
jjxtra Add unblock ip addresses option
You can now place an unban.txt file in the service folder with a list of ip addresses (one per line) to unblock those ip addresses from the firewall and remove them from the ip ban internal database.
Latest commit df37f3f Mar 22, 2019
Type Name Latest commit message Commit time
Failed to load latest commit information.
Linux Add unblock ip addresses option Mar 22, 2019
MAC Add unblock ip addresses option Mar 22, 2019
Properties Rev version Jan 30, 2019
.gitignore Ignore vscode folder Jan 18, 2019
IPBan.csproj Implement tests Mar 9, 2019
IPBanPlugin.cs Add unblock ip addresses option Mar 22, 2019
nlog.config Remove most of dependancy on configuration manager Jul 30, 2018
packages.config Missed files from last commit Jun 26, 2018
settings.json Improve firewall for Linux Jan 18, 2019

IPBan Service


Sign up for the IPBan Mailing List


  • IPBan requires .NET core 2.2 SDK and Visual Studio 2017 or newer or Visual Studio Code (Linux) to build from source. You can build a self contained executable to eliminate the need for dotnet core on the server machine, or just download the precompiled binaries.
  • Running and/or debugging code requires that you run as administrator or root.
  • Supported platforms: Windows (x86, x64), Linux (x64).
  • Mac OS X not supported at this time.


  • Auto ban ip addresses on Windows and Linux by detecting failed logins from event viewer and/or log files (SSH, FTP, SMTP, etc.)
  • Highly configurable, many options to determine failed loging count threshold, time to ban, etc.
  • Banning happens basically instantly for event viewer. For log files, you can set how often it polls for changes.
  • Very fast - I've optimized and tuned this code since 2012. The bottleneck is pretty much always the firewall implementation, not this code.
  • Unban ip addresses easily by placing an unban.txt file into the service folder with each ip address on a line to unban.
  • See the app.config file for a complete list of options, each property is well documented. There are lots of them.


  • Official download link is
  • Make sure to look at the config file for configuration options, each are documented with comments.
  • Here is a regex that matches any 32 bit ip address, useful if you need to add a new block option in the config file:


  • For Windows, IPBan is supported on Windows Server 2008 or equivalent or newer. Windows XP and Server 2003 are NOT supported.
  • Extract the (inside is file to a place on your computer. Right click on all the extracted files and select properties. Make sure to select "unblock" if the option is available. You can use the Unblock-File utility with an elevated PowerShell to unblock all files in the IPBan directory:
dir C:\path\to\ipban | Unblock-File
  • You MUST make this change to the local security policy to ensure ip addresses show up: Change Local Security Policy -> Local Policies -> Audit Policy and turn failure logging on for "audit account logon events" and "audit logon events". From an admin command prompt:
auditpol /set /category:"Logon/Logoff" /success:enable /failure:enable
auditpol /set /category:"Account Logon" /success:enable /failure:enable
  • For Windows Server 2008 or equivalent, you should disable NTLM logins and only allow NTLM2 logins. On Windows Server 2008, there is no way to get the ip address of NTLM logins. Use secpol -> local policies -> security options -> network security restrict ntlm incoming ntlm traffic -> deny all accounts.
  • To install as a Windows service use the sc command and run the following in an elevated command window:
sc create IPBAN type= own start= auto binPath= c:\path\to\service\IPBan.exe DisplayName= IPBAN
sc description IPBAN "Automatically builds firewall rules for abusive login attempts:"

The service needs file system, event viewer and firewall access, so please run as SYSTEM to ensure permissions. Running "sc" as described above in an elevated command prompt will install the service using the local SYSTEM account.

  • To run as a console app, simply run IPBan.exe and watch console output.
  • If you want to run and debug code in Visual Studio, make sure to run Visual Studio as administrator. Visual Studio 2017 or newer is required, along with .net core 2.1.1. Community edition is free.
  • On some Windows versions, NLA will default to on. This will lock you out of remote desktop, so make sure to turn this option off.
  • On Windows Small Business Server 2011 (and probably earlier) and Windows Server running Exchange, with installed PowerShell v.2 that does not know Unblock-File command, and newer version can’t be installed (as some scripts for managing OWA stop working correctly). Easier way is to manually unblock downloaded ZIP file and then unzip content.
  • On Windows Server running Exchange, it is impossible to disable NTLM (deny all clients in Security restrict ntlm incoming ntlm traffic) as then Outlook on client computers permanently asks users for entering username and password. To workaround this, set LAN Manager authenticating level in Security Optins of Local Policies to "Send NTLMv2 response only. Refuse LM & NTLM". There is one small issue – when somebody tries to login with an undefined username, the log does not contain an IP address. Not sure why Microsoft can't log an ip address properly... :|
  • If using Exchange, disabling app pool 'MSExchangeServicesAppPool' can eliminate quite a lot of problems in the event viewer with ip addresses not being logged.


  • Build and run code with Visual Studio code
    • This shell script runs vscode as root:
    • sudo mount -t vboxsf ipban ~/Desktop/ipban # only needed if you are in a Virtual Box VM and have setup a shared folder to Windows
    • sudo code --user-data-dir="/tmp/vscode-root"
  • IPBan is currently supported on all Linux that have iptables and ipset installed. Only ipv4 is supported.
  • SSH into your server as root. If using another admin account name, substitute all root user instances with your account name.
  • Install dependencies:
sudo apt-get install iptables
sudo apt-get install ipset
sudo apt-get install vsftpd
sudo apt-get update
  • mkdir /root/ipban
  • Extract the file (inside is folder and use ftp to copy files to /root/ipban
  • chmod +x ./root/ipban/IPBan (makes sure the IPBan executable has execute permissions)
  • Create service:
sudo nano /lib/systemd/system/ipban.service
  • Paste in these contents:
Description=IPBan Service


  • Save service file (Ctrl-X)
  • Start the service:
sudo systemctl daemon-reload 
sudo systemctl enable ipban
sudo systemctl start ipban
systemctl status ipban

About Me

I'm Jeff Johnson and I created IPBan to block hackers out because Windows (and Linux quite frankly) does a horrible job of this by default and performance suffers as hackers try to breach your remote desktop or SSH. IPBan gets them in the block rule of the firewall where they belong.

Please visit for more information about this program or downloads.

I do consulting and contracting if you need extra customizations for this software.

Donations are accepted, any amount is appreciated, I work on this project for free to benefit the world.


Jeff Johnson, CEO/CTO
Digital Ruby, LLC

You can’t perform that action at this time.