Skip to content
  • Bitcoin accepted
  • MMonero accepted
  • DMCA-resilient
  • Anonymous signup
  • ΞEthereum accepted
  • No KYC
  • 99.99% uptime
  • 24/7 support
  • 7-day money-back
  • Provisioned in < 5 min
  • Iceland · Switzerland · Netherlands
  • USDT accepted
Bitcoin accepted. Monero accepted. DMCA-resilient. Anonymous signup. Ethereum accepted. No KYC. 99.99% uptime. 24/7 support. 7-day money-back. Provisioned in under 5 minutes. Iceland, Switzerland, Netherlands. USDT accepted.
SilentHosts
Get started
Security3 min readUpdated 2026-04-30

Set up fail2ban in 5 minutes

Auto-ban IPs that fail too many SSH login attempts. The single highest-ROI security tool for VPS.

fail2ban tails system log files and bans source IPs that fail authentication too many times in a row. Default config is good for SSH; custom jails extend to nginx, Postfix, and other services.

Install

On Ubuntu/Debian:

apt update && apt install fail2ban -y

On AlmaLinux/Rocky:

dnf install fail2ban -y

Configure

Create /etc/fail2ban/jail.local (the .local file overrides /etc/fail2ban/jail.conf which gets replaced on package upgrade):

[DEFAULT]
bantime = 3600
findtime = 600
maxretry = 3

[sshd] enabled = true port = 22222 # match your custom SSH port

This bans IPs for 1 hour after 3 failed attempts in 10 minutes.

Enable and start

systemctl enable fail2ban
systemctl start fail2ban

Verify status:

fail2ban-client status sshd

Whitelist your own IP

If you have a static home or office IP, add it to the ignoreip list to avoid locking yourself out:

[DEFAULT]
ignoreip = 127.0.0.1/8 ::1 1.2.3.4

Deploy your first offshore server in 60 seconds.

Anonymous signup. Bitcoin & Monero accepted. Provisioned across 8 jurisdictions.

No credit card required · 7-day money-back guarantee