Hello ALL!
Yes, that's right - the problem was incorrect file encoding.
I converted the file to UNIX UTF8 (EOL for UNIX) and all IP addresses from the file were imported completely.
Thanks everyone for your help.
I already wrote earlier that when importing from a local file, it only imports one IP address, which is the latest in the file!
All other IP addresses are not imported at all!
My command:
firewall import blacklist /mnt/sda1/entware/tmp/banlist.txt "abc"
No, this doesn't work:
firewall import blacklist https://mysite.abc/catalog/file.txt
I tried it, but I got an error: 404 error!
Although the file.txt from the https://mysite.abc/catalog/file.txt can be opened in any browser without any problems!
I want to make sure that they do not even reach the server and are blocked at the entrance to the router.Otherwise, the server log is like an endless tape. The server software allows me to upload the IP addresses of those who do bruteforce into a file that I want to import every day into Skynet.
Why do I even need other people’s problems related to bruteforce of other people’s servers?
I have my own server and I want to take from the log of my server the IP addresses of those who engage in bruteforce and block them at the entrance to the router.
That's all...
Don't enter this manually...
Hello!
Please tell me the exact structure of recording multiple IP addresses for importing into the blacklist from a file (local & https://... ).
I tried this form of recording IP addresses in a text file (UTF8):
var #1 (to column)
1.2.3.4
5.6.7.8.
...
var #2 (into a single line with separated...