You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If you receive a `200 OK`, you can authenticate to the AppSec Component. If the component is misconfigured or your API key is invalid, you will receive a `401 Unauthorized`:
We can now query our AppSec Component (we're assuming here that it runs on the default `127.0.0.1:7422`, see the `listen_addr` parameter of the acquisition config):
Copy file name to clipboardExpand all lines: crowdsec-docs/docs/central_api/blocklist.md
+29-5Lines changed: 29 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,29 +12,53 @@ The "Community Blocklist" is a curated list of IP addresses identified as malici
12
12
# Community Blocklist Variation and Eligibility
13
13
14
14
The rules are different for free and paying users:
15
-
- Free users that **do not** contribute get the `Community Blocklist (Lite)`
16
-
- Free users that **do** contribute get access to the `Community Blocklist`
15
+
- Free users that **do not regularly** contribute get the `Community Blocklist (Lite)`
16
+
- Free users that **do regularly** contribute get access to the `Community Blocklist`
17
17
- Paying users get access to the `Community Blocklist (Premium)`, even if they don't contribute
18
18
19
19
Regardless of the blocklist "tier" you have access to (`Lite`, `Community`, `Premium`), each Security Engine gets a tailored blocklist based on the kind of behavior you're trying to detect.
20
20
21
-
# Community Blocklist
21
+
##Community Blocklist
22
22
23
23
Free users that are actively contributing to the network (sending signal on a regular basis) have their Security Engines automatically subscribed to the *Community Blocklist*.
24
24
25
25
The content of the blocklist is unique to each Security Engine, as it mirrors the behaviours they report. For example, suppose you're running the Security Engine on a web server with WordPress. In that case, you will receive IPs performing generic attacks against web servers *and* IPs engaging in wordpress-specific attacks.
26
26
27
27
The *Community Blocklist* contains 15 thousand malicious IP's based on your reported scenarios.
28
28
29
-
# Community Blocklist (Premium)
29
+
##Community Blocklist (Premium)
30
30
31
31
Paying users' Security Engine are automatically subscribed to the *Community Blocklist (Premium)*, which contains IPs that mirror their installed scenarios.
32
32
Paying users' do not need to contribute to the network to be eligible to the blocklist.
33
33
34
34
The *Community Blocklist (Premium)* blocklist content has no size limit, unlike free users.
35
35
36
-
# Community Blocklist (Lite)
36
+
##Community Blocklist (Lite)
37
37
38
38
Free users that are not actively contributing to the network or that have been flagged as cheating/abusing the system will receive the *Community Blocklist (Lite)*.
39
39
40
40
This Blocklist is capped at 3 thousand IPs.
41
+
42
+
### Why is my Security Engine on the Lite Blocklist?
43
+
44
+
Your Security Engine may be placed on the Lite Blocklist for various reasons, such as:
45
+
46
+
1. Low Visibility Services
47
+
48
+
Your services are self-hosted (e.g., for private video or image hosting) and primarily accessed by a small group. As a result, your Security Engine detects less malicious activity compared to public-facing services like blogs or e-commerce sites.
49
+
50
+
2. Comprehensive Security Setup
51
+
52
+
Your existing security measures reduce reliance on the Community Blocklist. These may include:
53
+
- Geoblocking (restricting access to certain countries)
0 commit comments