Stop Scanners, VPNs & Abusive IPs β Join the Collective Defense
Why block known IPs (VPNs, scanners, abusive networks)?
Many IPs used by VPN services, automated scanners, or suspicious users originate from data centers or cloud providers. Although these IPs may appear residential, they're often used for:Port scanning
- π‘ Firewall evasion
Abuse and intrusion attempts
Proxy / VPN / TOR cloaking

Collective Protection = Better Security
When multiple servers and projects share the same block lists, attackers lose power:Known scanners are blocked instantly
Abusive IPs are shut down globally
Fewer login attempts, lower server load, better uptime
Conclusion
The more we share and apply trusted IP blocklists, the harder it becomes for bots and attackers to even reach our services.
Scripts to Block Automatically
You can use these one-liner scripts to stay protected:1. IPSET Auto-Block:
Bash:
wget -qO- https://raw.githubusercontent.com/Akademik120706/ipset/main/update-ipset.sh | bash
β Uses ipset for fast performance
β Pulls fresh blocklist from GitHub
β Creates or updates "bad_ips" list
β Adds iptables rules to block them
2. IPTABLES Auto-Block:
Bash:
wget -qO- https://raw.githubusercontent.com/Akademik120706/iptables/main/update-ip.sh | bash
β Uses classic iptables directly
β Works with existing firewall setups
β Loads predefined block rules instantly
GitHub Repositories
Join Our Telegram Group
Weβve created a group to share bad IPs, scanners, and abuse reports:
Together we can reduce attacks before they happen!