8.3kā
by jestersimpps
fail2ban-reporter ā OpenClaw Skill
fail2ban-reporter is an OpenClaw Skills integration for coding workflows. Auto-report fail2ban banned IPs to AbuseIPDB and notify via Telegram. Use when monitoring server security, reporting attackers, or checking banned IPs. Watches fail2ban for new bans, reports them to AbuseIPDB, and sends alerts.
Skill Snapshot
| name | fail2ban-reporter |
| description | Auto-report fail2ban banned IPs to AbuseIPDB and notify via Telegram. Use when monitoring server security, reporting attackers, or checking banned IPs. Watches fail2ban for new bans, reports them to AbuseIPDB, and sends alerts. OpenClaw Skills integration. |
| owner | jestersimpps |
| repository | jestersimpps/fail2ban-reporter |
| language | Markdown |
| license | MIT |
| topics | |
| security | L1 |
| install | openclaw add @jestersimpps/fail2ban-reporter |
| last updated | Feb 7, 2026 |
Maintainer

name: fail2ban-reporter description: "Auto-report fail2ban banned IPs to AbuseIPDB and notify via Telegram. Use when monitoring server security, reporting attackers, or checking banned IPs. Watches fail2ban for new bans, reports them to AbuseIPDB, and sends alerts."
fail2ban Reporter
Monitor fail2ban bans and auto-report attackers to AbuseIPDB.
Setup
- Get a free AbuseIPDB API key at https://www.abuseipdb.com/account/api
- Store it:
pass insert abuseipdb/api-key - Install the monitor:
bash {baseDir}/scripts/install.sh
Manual Usage
Report all currently banned IPs
bash {baseDir}/scripts/report-banned.sh
Check a specific IP
bash {baseDir}/scripts/check-ip.sh <ip>
Show ban stats
bash {baseDir}/scripts/stats.sh
Auto-Reporting
The install script sets up a fail2ban action that auto-reports new bans.
bash {baseDir}/scripts/install.sh # install auto-reporting
bash {baseDir}/scripts/uninstall.sh # remove auto-reporting
Heartbeat Integration
Add to HEARTBEAT.md to check for new bans periodically:
- [ ] Check fail2ban stats and report any unreported IPs to AbuseIPDB
Workflow
- fail2ban bans an IP ā action triggers
report-single.sh - Script reports to AbuseIPDB with SSH brute-force category
- Sends Telegram notification (if configured)
- Logs report to
/var/log/abuseipdb-reports.log
API Reference
See references/abuseipdb-api.md for full API docs.
š”ļø Clawdbot fail2ban Reporter
Auto-report fail2ban banned IPs to AbuseIPDB, protecting the community from brute-force attackers.
Built for Clawdbot ā works as a standalone tool too.
Why?
Every server with a public IP gets attacked. fail2ban blocks them locally ā but reporting to AbuseIPDB blocks them globally. When you report an attacker, every other server using AbuseIPDB's blocklist benefits.
Real stats from a fresh server:
Within 60 seconds of enabling fail2ban:
ā 62 failed SSH attempts
ā 9 unique IPs banned
ā Attacks from 7 countries
Quick Start
1. Get an AbuseIPDB API Key (free)
Sign up at abuseipdb.com ā free tier allows 1000 reports/day.
2. Store your API key
# Using pass (recommended)
pass insert abuseipdb/api-key
# Or export directly
export ABUSEIPDB_KEY="your-api-key"
3. Report currently banned IPs
bash scripts/report-banned.sh
4. Enable auto-reporting (optional)
sudo bash scripts/install.sh
Now every new fail2ban ban automatically reports to AbuseIPDB.
Usage
Report all banned IPs
bash scripts/report-banned.sh # default: sshd jail
bash scripts/report-banned.sh nginx # custom jail
Check an IP's reputation
bash scripts/check-ip.sh 1.2.3.4
View stats
bash scripts/stats.sh
Remove auto-reporting
sudo bash scripts/uninstall.sh
Clawdbot Skill
If you're using Clawdbot, install as a skill:
# Copy to skills directory
cp -r . ~/.clawdbot/skills/fail2ban-reporter/
Then ask your Clawdbot:
- "Report banned IPs to AbuseIPDB"
- "Check IP 1.2.3.4"
- "Show fail2ban stats"
Heartbeat Integration
Add to your HEARTBEAT.md:
- [ ] Check fail2ban for new bans, report unreported IPs to AbuseIPDB
How It Works
Attacker ā SSH brute-force ā fail2ban bans IP ā report-single.sh
ā
AbuseIPDB API (report)
ā
/var/log/abuseipdb-reports.log
Prerequisites
fail2banāsudo apt install fail2banjqāsudo apt install jqcurlā usually pre-installedpass(optional) ā for secure API key storage
License
MIT ā report those attackers, protect the community! š”ļø
Permissions & Security
Security level L1: Low-risk skills with minimal permissions. Review inputs and outputs before running in production.
Requirements
- OpenClaw CLI installed and configured.
- Language: Markdown
- License: MIT
- Topics:
FAQ
How do I install fail2ban-reporter?
Run openclaw add @jestersimpps/fail2ban-reporter in your terminal. This installs fail2ban-reporter into your OpenClaw Skills catalog.
Does this skill run locally or in the cloud?
OpenClaw Skills execute locally by default. Review the SKILL.md and permissions before running any skill.
Where can I verify the source code?
The source repository is available at https://github.com/openclaw/skills/tree/main/skills/jestersimpps/fail2ban-reporter. Review commits and README documentation before installing.
