Back to blog

Protect HestiaCP servers with an IPset list

4/29/2025 · 2 min · HestiaCP

Share

HestiaCP combined with Fail2ban and Iptables provides a strong security baseline. With IPset, you can maintain dynamic malicious IP lists and apply high-performance blocking at scale.

Why IPset lists are useful

Creating a malicious IP list

Hestia includes an automatic update script:

/usr/local/hestia/install/common/firewall/ipset/blacklist.sh

It aggregates multiple public sources, for example:

Attack categories commonly mitigated

With updated feeds and correct rules, you reduce exposure to:

Note: threat techniques evolve constantly. Keep list feeds, monitoring, and incident response policy updated.

Register the list in HestiaCP

Inside Hestia panel:

  1. Open Server Settings.
  2. Go to Firewall.
  3. Open IP Set Lists.
  4. Click Add IP list.

Fill fields with:

Create firewall rules

After list registration, apply deny rules for ipset:BLOCK-LIST.

Rule 1: deny TCP (inbound)

Rule 2: deny UDP (outbound)

Rule 3: deny ICMP

This keeps your server continuously protected with trusted, auto-updated bad-IP feeds.

CC BY-NC

This post is licensed under CC BY-NC.

Comments

Join the discussion below.