many attempts from the same IP Jul 03 16:31:04 r3-pve.rocky9-pve3.org crowdsec1[79895]: time="2025-07-03T14:31:04Z" level=info msg="(localhost/crowdsec) crowdsecurity/dovecot-spam by ip 192.168.12.1 : 12m ban on Ip 192.168.12.1"
one attempt in 10 minutes from more than 10 IP and we ban each IP for x minutes
Jul 03 16:25:17 r3-pve.rocky9-pve3.org rspamd[78579]: (rspamd_proxy) <298a20>; milter; rspamd_milter_process_command: got connection from 192.168.12.1:36176
Jul 03 16:25:17 r3-pve.rocky9-pve3.org rspamd[78579]: (rspamd_proxy) <298a20>; proxy; proxy_milter_finish_handler: finished milter connection
Jul 03 16:25:17 r3-pve.rocky9-pve3.org crowdsec1[79895]: time="2025-07-03T14:25:17Z" level=info msg="Ip 2 sources performed 'custom/distributed-postfix-bruteforce' (4 events over 3.000203177s) at 2025-07-03 14:25:17.516239687 +0000 UTC"
Jul 03 16:25:18 r3-pve.rocky9-pve3.org crowdsec1[79895]: time="2025-07-03T14:25:18Z" level=info msg="(localhost/crowdsec) custom/distributed-postfix-bruteforce by ip 192.168.12.15 : 8m ban on Ip 192.168.12.15"
Jul 03 16:25:18 r3-pve.rocky9-pve3.org crowdsec1[79895]: time="2025-07-03T14:25:18Z" level=info msg="(localhost/crowdsec) custom/distributed-postfix-bruteforce by ip 192.168.12.1 : 8m ban on Ip 192.168.12.1"
Jul 03 16:25:18 r3-pve.rocky9-pve3.org crowdsec1[79895]: time="2025-07-03T14:25:18Z" level=info msg="Signal push: 2 signals to push"
Jul 03 16:25:24 r3-pve.rocky9-pve3.org crowdsec1-firewall-bouncer[75292]: time="2025-07-03T14:25:24Z" level=info msg="2 decisions added"
This is an interesting case. Since banning the subnet on the fw 4 days ago theyâve continued to pound away and now the fw logs are utterly flooded. It was best to see this and take action to let the fw deal with it instead of the mail server and I can see where an automated notification of high volume of blocks by crowdsec would be beneficial so the action of blocking at the fw could be taken instead of letting crowdsec deal with it for weeks until someone noticed.
But this means to check the logs or get a notification mail and manually block the subnet on the firewall. No check â no block.
On a VPS for example, thereâs no hardware firewall.
I think itâs an advantage that crowdsec is able check for different IPs from the same subnet and automatically ban it.
As soon as crowdsec bans, the mail server doesnât get requests from banned IPs anymore.
I thought this is what crowdsec already does. If an IP is banned itâs blocked on firewall layer (nftables)
My concern was that I donât like to check crowdsec logs to manually block a network on an external firewall. It should work automatically IMO.