Outnumbering hackers all together

CrowdSec is an open-source and collaborative EDR.
Analyze behaviors, respond to attacks & share signals across the community

Get Started
  • 01

    Parse logs

    Acquire data from any source (syslog, cloudtrails, SIEM, etc.)
  • 02

    Set up your own intrusion detection system

    Apply behavior scenarios to identify cyberthreats
  • 03

    Automate your security

    Define the type of remediation you want to apply and where
  • 04

    Leverage the community’s IP blacklist

    Share and benefit from a crowdsourced and curated cyber threat intelligence system

The massively multiplayer firewall

CrowdSec is designed to run seamlessly on virtual machines, bare-metal servers, containers or to be called directly from your code with our API.

Read the Documentation

Collaborative Security

Our strength comes from our cybersecurity community which is burning hackers’ anonymity. By sharing the IP addresses that aggressed you, you help us curate and redistribute a qualified IP blacklist to protect everyone.

Stateless & Decoupled

By decoupling detection (agent) and remediation (bouncer), CrowdSec doesn’t interrupt your data streams nor creates any single point of failure. It can fit any serverless, cloud-based, VM or bare-metal context in one (agent) to one (bouncer), one to many, many to one, and many to many typologies.

High performance

Written in Golang, CrowdSec is 60x faster than its predecessor (Fail2ban) and can parse massive amounts of logs in no time. The agent can read from disks, networks or RAM backends for very high throughput systems. For CPU & RAM-constrained assets, bouncers can just make very light API calls.

Observability

Dashboards are great steering tools. CrowdSec is instrumented with Metabase & Prometheus to help you make smarter investments of both time & money and better defend yourself. Compliance reporting like PCI-DSS, ISO, GDPR  are also on our roadmap.

Multilayer & IPV6 ready

No matter if your servers or attackers are using IPV4 or IPV6 addresses, CrowdSec will do the job. This next-gen HIDS has been designed to not only deal with IPs but also with user sessions and more business-oriented layers.

Ease of use

CrowdSec is designed and developed by former pentesters, SecOps & DevOps to be a fire & forget, easy to deploy, automate, configure and maintain software. This is what CrowdSec is about: bringing security to the largest number.

GDPR Compliant

Sharing is caring but privacy matters even more. We collect the very strict minimum in order to be GDPR compliant. Hence, we never export your logs and the only data sent for curation are a timestamp, the aggressive IP, and the scenario used in the attack.

Read the Documentation

Where to use it

  • OS
    • app.logo.alt
    • app.logo.alt
    • app.logo.alt
    • app.logo.alt
    • app.logo.alt
  • Services
    • app.logo.alt
    • app.logo.alt
    • app.logo.alt
    • app.logo.alt
    • app.logo.alt
    • app.logo.alt
  • Languages & frameworks
    • app.logo.alt
    • app.logo.alt
    • app.logo.alt
    • app.logo.alt
    • app.logo.alt
    • app.logo.alt
    • app.logo.alt
  • Platforms
    • app.logo.alt
    • app.logo.alt
    • app.logo.alt
    • app.logo.alt
    • app.logo.alt
    • app.logo.alt
    • app.logo.alt
    • app.logo.alt
Find your best setup on the Hub
Join the crowd

Hackers constantly collaborate together, on a world scale. Each IP they control are anonymity tokens to hide their hacktivities. Our only chance is to stand as a crowd and act in a coordinated way, as they do. When you, Sysadmins, Devops & Secops join forces, you outnumber them and can burn their IPs one by one, crippling this precious anonymity.

  • 0B089598-964A-4610-8424-5B9BA76E04EF

    250k rogue IPs detected

  • DB3489A0-E3FC-4AF5-BFC0-C20F5E521A89

    3.1k stars on GitHub

  • Icon/KeyNumbers/countries

    85 countries

False positive & Poisoning resilient

  • Minimum necessary remediation
  • 3-day probing mechanism (auto-deban)
  • Self-unban
  • Consensus involving range qualification
  • Tailor made list to avoid broadcasting all IPs blindy

Get Started

Install the Agent

  • Debian (our repo)
    wget -qO - https://s3-eu-west-1.amazonaws.com/crowdsec.debian.pragmatic/crowdsec.asc |sudo apt-key add - && echo "deb https://s3-eu-west-1.amazonaws.com/crowdsec.debian.pragmatic/$(lsb_release -cs) $(lsb_release -cs) main" | sudo tee /etc/apt/sources.list.d/crowdsec.list > /dev/null
    sudo apt-get update
    apt-get install crowdsec
    Copy code
  • Debian (Official)
    apt-get install crowdsec
    Copy code
  • Docker
    docker run -d -v acquis.yaml:/etc/crowdsec/acquis.yaml \
    -e COLLECTIONS="crowdsecurity/sshd"
    -v /var/log/auth.log:/var/log/auth.log \
    -v /path/mycustom.log:/var/log/mycustom.log \
    --name crowdsec crowdsecurity/crowdsec
    Copy code
  • Free BSD
    pkg install crowdsec
    Copy code

Install a Bouncer

  • Kernel Firewall
    wget -qO - https://github.com/crowdsecurity/cs-firewall-bouncer/releases/latest/download/cs-firewall-bouncer.tgz | tar zxvf -
    cd cs-firewall* && ./install.sh
    Copy code
  • AWS/GCP
    https://hub.crowdsec.net/author/fallard84/bouncers/cs-cloud-firewall-bouncer
    Copy code
  • Custom
    wget -qO - https://github.com/crowdsecurity/cs-custom-bouncer/releases/latest/download/cs-custom-bouncer.tgz | tar xvzf -
    cd cs-custom-bouncer-*
    sudo ./install.sh
    Copy code
  • Caddy
    https://hub.crowdsec.net/author/hslatman/bouncers/caddy-crowdsec-bouncer
    Copy code
  • Nginx
    wget -qO - https://github.com/crowdsecurity/cs-nginx-bouncer/releases/latest/download/cs-nginx-bouncer.tgz | tar xvzf -
    cd cs-nginx-bouncer-v*/
    sudo ./upgrade.sh && sudo systemctl restart nginx
    Copy code
  • Wordpress
AFEB9F8A-65D8-49C4-BF47-4958C484D8C8
Download v1.0.9