I'm using fail2ban 0.10.0 and with it I'm able to trigger some actions to block bruteforce attempts from a given single origin (with the HOST tag).
But suppose someone has control over an entire /24 block and is using it to make his bot based bruteforce attacks. Using a fairly reasonable config with findtime = 3600 and maxretry = 3 the attacker still could do about 4 tries per minute without repeating his source address (and without triggering a fail2ban action), and then start over again as the findtime would have expired.
My question: while filtering, is there some way to make fail2ban aware of a given IP block (like a /24) and make findtime and maxretry valid for any address inside this range so it would trigger the action?
For example:
INFO [postfix-sasl] Found 1.1.1.1
INFO [postfix-sasl] Found 1.1.1.2
INFO [postfix-sasl] Found 1.1.1.3
NOTICE [postfix-sasl] Ban 1.1.1.0/24
Thanks for the help!