Renato
January 9, 2026, 9:03am
3005
Everything started to work again after clicking on “Refresh” button some times:
GeoIP Map wasn’t working at this time:
:::
::: banIP Set Statistics
:::
Timestamp: 2026-01-08 11:14:31
------------------------------
blocked syn-flood packets : 990
blocked udp-flood packets : 78
blocked icmp-flood packets : 146927
blocked invalid ct packets : 15880
blocked invalid tcp packets: 0
---
auto-added IPs to allowlist: 0
auto-added IPs to blocklist: 0
Also didn’t work:
:::
::: banIP Set Statistics
:::
Timestamp: 2026-01-08 11:16:31
------------------------------
blocked syn-flood packets : 990
blocked udp-flood packets : 78
blocked icmp-flood packets : 147160
blocked invalid ct packets : 15880
blocked invalid tcp packets: 0
---
auto-added IPs to allowlist: 0
auto-added IPs to blocklist: 0
Also didn’t work:
:::
::: banIP Set Statistics
:::
Timestamp: 2026-01-08 12:33:51
------------------------------
blocked syn-flood packets : 990
blocked udp-flood packets : 78
blocked icmp-flood packets : 156278
blocked invalid ct packets : 16142
blocked invalid tcp packets: 0
---
auto-added IPs to allowlist: 0
auto-added IPs to blocklist: 0
Started to work at this point:
:::
::: banIP Set Statistics
:::
Timestamp: 2026-01-08 15:55:34
------------------------------
blocked syn-flood packets : 990
blocked udp-flood packets : 85
blocked icmp-flood packets : 180052
blocked invalid ct packets : 16421
blocked invalid tcp packets: 0
---
auto-added IPs to allowlist: 0
auto-added IPs to blocklist: 0
# wc -l ban_map.jsn
306 ban_map.jsn
# wc -l ban_report.jsn
27 ban_report.jsn
# wc -l ban_report.txt
4166 ban_report.txt
maxdd
January 10, 2026, 12:20pm
3006
Is the logging from the WAN zone (in firewall) also catching banIP drops or is it chained after?
sqrwv
January 10, 2026, 5:40pm
3007
By definition/design the deduplicate function will deduplicate all sets.
Probably this is known, but I only noticed it today:
Since the DNS set only applies to ports 53;853 and the DoH set only applies to 80;443 ports, if there are duplicated IPs in these 2 sets they will be removed from the DoH set and they won't be banned with 80;443 ports.
These 2 sets souldn’t be deduplicated between themselfs, since they apply to different ports. We can disabled the deduplicate function to solve the issue.
dibdot
January 11, 2026, 5:00am
3008
There is already an option under "Feed/Set Settings" for that ...
Check with IP Search:
3 Likes
sqrwv
January 11, 2026, 10:59am
3009
Thanks! That's exactly what I was looking for and the option was already there.
1 Like
dibdot
January 12, 2026, 10:46pm
3010
FYI, a new banIP release 1.8.0 is in master:
committed 09:59PM - 12 Jan 26 UTC
* hardened the uci config parsing
* added a fast, flexible & secure IPv4/IPv6 va… lidator function, it eliminates > 99 % of garbage inputs
Please note: The ‘rule’ in the feed file now only contains parameters for the IP validator;
details can be found in the readme file. Old custom feed files are not compatible and will be
backed up/removed via the uci-defaults script
* added BCP38 support: to block packets with spoofed source IP addresses in all supported chains
* optimized the log monitor plus performance improvements
* removed the pallebone feed (discontinued)
* added the ipexdbl feed
* various small improvements
* LuCI: add the BC38 option under Table/Chain Settings
* LuCI: updating the custom feed editor
* LuCI: small usability improvements
* readme update
Signed-off-by: Dirk Brenken <dev@brenken.org>
The BCP38 implementation in banIP uses nftables’ FIB lookup to enforce this. It checks whether the packet’s source address is not valid for the incoming interface or whether the routing table reports no route for this source on this interface. Packets that fail this check are dropped.
Have fun!
Dirk
Edit: backported to next stable branch 25.12.x as well.
6 Likes
RSHARM
January 14, 2026, 2:29pm
3011
I added 9.9.9.9 to allowlist but DoH list is still blocking it.
Also How to only allow a IP for certain interface/zone or clients ?
dibdot
January 14, 2026, 4:19pm
3012
Not reproducible, did you reload after the allowlist addition?
Please consult the readme - keywords are "ban_vlanallow" and " MAC/IP-binding"
dibdot
January 14, 2026, 6:10pm
3014
Than explain how did you test that banIP blocks that IP?
To get results, open your browser and try to open "https://9.9.9.9 ", after that post the output of:
/etc/init.d/banip content allowlist.v4
and
/etc/init.d/banip report