CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the most advanced real-world CTI. https://crowdsec.net
Find a file
2025-02-19 15:04:47 +01:00
.github use go 1.24, enable unencrypted http2 (#3470) 2025-02-19 14:05:17 +01:00
cmd Add support for centralized allowlists (#3355) 2025-02-19 15:04:47 +01:00
config enhance: Add default_range_remediation (#3109) 2024-07-05 16:04:33 +01:00
debian run 'hub upgrade' in rpm/deb postinst, improve hub message (#3440) 2025-02-04 16:51:02 +01:00
docker CI: lint docker tests (#3443) 2025-02-17 11:04:26 +01:00
mk make: remove redundant go version check (#3118) 2024-07-09 14:49:55 +02:00
pkg Add support for centralized allowlists (#3355) 2025-02-19 15:04:47 +01:00
rpm run 'hub upgrade' in rpm/deb postinst, improve hub message (#3440) 2025-02-04 16:51:02 +01:00
scripts move plugins/notifications/* to cmd/notification-* (#2429) 2023-08-24 09:46:25 +02:00
test Add support for centralized allowlists (#3355) 2025-02-19 15:04:47 +01:00
windows fix lapi credentials creation for debian package (#2646) 2023-12-08 12:10:23 +01:00
.dockerignore support capi_whitelists.yaml (#2224) 2023-05-25 10:02:33 +02:00
.gitignore acquisition: add some test and warning for wrong source type (#3362) 2024-12-13 11:00:41 +01:00
.gitmodules Rename directory "tests" to "test" (#2094) 2023-03-03 15:54:49 +01:00
.golangci.yml use go 1.24, enable unencrypted http2 (#3470) 2025-02-19 14:05:17 +01:00
.yamllint CI: colored test output, colored crowdsec and crowdsec-api logs, full final db dump for mysql and sqlite (#1596) 2022-06-17 16:12:49 +02:00
azure-pipelines.yml fix go version for azure pipeline (#3324) 2024-11-12 14:49:26 +01:00
CONTRIBUTING.md "make localstack" target, link to docs/contributing (#1522) 2022-05-17 15:54:52 +02:00
Dockerfile use go 1.24, enable unencrypted http2 (#3470) 2025-02-19 14:05:17 +01:00
Dockerfile.debian use go 1.24, enable unencrypted http2 (#3470) 2025-02-19 14:05:17 +01:00
go.mod use go 1.24, enable unencrypted http2 (#3470) 2025-02-19 14:05:17 +01:00
go.sum deps: use ent 0.14.2 (#3259) 2025-02-18 17:08:58 +01:00
LICENSE CI: Cache all built go modules (#2081) 2023-02-28 17:25:09 +01:00
make_chocolatey.ps1 Update windows pipeline (#2909) 2024-03-19 17:42:08 +01:00
make_installer.ps1 Update windows pipeline (#2909) 2024-03-19 17:42:08 +01:00
Makefile acquisition/victorialogs: add new datasource (#3310) 2025-01-29 16:59:03 +01:00
README.md README revamp (#3408) 2025-01-21 15:05:12 +00:00
SECURITY.md renamed security.MD -> SECURITY.md, typos (#1774) 2022-10-04 09:50:18 +02:00
wizard.sh wizard.sh: remove obsolete --yes option (#3450) 2025-02-07 12:14:13 +01:00

CrowdSec




CrowdSec is an open-source and participative security solution offering crowdsourced server detection and protection against malicious IPs. Detect and block with our Security Engine, contribute to the network, and enjoy our real-time community blocklist.

CrowdSec schema

Features & Advantages

Versatile Security Engine

CrowdSec Security Engine is an all-in-one IDS/IPS and WAF.

It detects bad behaviors by analyzing log sources and HTTP requests, and allows active remedation thanks to the Remediation Components.

Detection rules are available on our hub under MIT license.

CrowdSec Community Blocklist

The "Community Blocklist" is a curated list of IP addresses identified as malicious by CrowdSec. The Security Engine proactively block the IP addresses of this blocklist, preventing malevolent IPs from reaching your systems.

CrowdSec Community Blocklist

Console - Monitoring & Automation of your security stack

CrowdSec Console

Multiple Platforms support

Multiple Platforms support

Outnumbering hackers all together

By sharing the threat they faced, all users are protecting each-others (hence the name Crowd-Security). Crowdsec is designed for modern infrastructures, with its "Detect Here, Remedy There" approach, letting you analyze logs coming from several sources in one place and block threats at various levels (applicative, system, infrastructural) of your stack.

CrowdSec ships by default with scenarios (brute force, port scan, web scan, etc.) adapted for most contexts, but you can easily extend it by picking more of them from the HUB. It is also easy to adapt an existing one or create one yourself.

Installation

Follow our documentation to install CrowdSec in a few minutes on Linux, Windows, Docker, OpnSense, Kubernetes, and more.

Resources

  • Console: Supercharge your CrowdSec setup with visualization, management capabilities, extra blocklists and premium features.
  • Documentation: Learn how to exploit your CrowdSec setup to deter more attacks.
  • Discord: A question or a suggestion? This is the place.
  • Hub: Improve your stack protection, find the relevant remediation components for your infrastructure.
  • CrowdSec Academy: Learn and grow with our courses.
  • Corporate Website: For everything else.