Integrate Fail2Ban with SikkerAPI to automatically report banned IPs to the community threat intelligence database. When Fail2Ban bans an IP on your server, the integration calls the Report API with the IP address, attack category, protocol, and an optional comment. No log snippets or sensitive information is ever transmitted.
Two files to download: the action configuration for Fail2Ban and the report script that calls the API. Takes under a minute.
Add the SikkerAPI action to your jails in /etc/fail2ban/jail.local. Each jail can specify its own category and protocol. The action runs alongside your existing ban action — banning still works normally even if reporting fails.
Recommended category and protocol for common Fail2Ban jails. Use these as a starting point and adjust based on your specific configuration.
Choose the category that best describes the attack your jail detects. Use the string name (not numeric ID). See the Report API for the full list of all 16 categories with numeric IDs.
Report submissions are rate-limited per API key. Rate limit errors do not affect the ban action — the IP is still blocked on your server, just not reported. If you run multiple servers, consider using separate API keys or upgrading your tier.
After configuration, reload Fail2Ban and verify reports are being submitted. Reported IPs appear in the IP Check response under the contributor section.
Common issues and how to resolve them. You can always test the script manually to isolate whether the issue is with Fail2Ban configuration or API connectivity.
The action configuration at /etc/fail2ban/action.d/sikkerapi.conf defines when the report script is called. Only actionban is used — no action is taken on unban, start, or stop events.