AlternativeTo Logo

Pyruse Alternatives

Pyruse is described as 'Light-weight and extra-configurable peruser of systemd journal logs: ban IP, send immediate email, daily report… all based on a single JSON configuration file' and is an app. There are five alternatives to Pyruse for Linux, Mac and Windows. The best alternative is Fail2ban, which is both free and Open Source. Other great apps like Pyruse are SSHGuard, Denyhosts, tallow and win2ban.

This page was last updated
Pyruse
  2
  • FreeOpen Source
  • Linux
  • Self-Hosted

Light-weight and extra-configurable peruser of systemd journal logs: ban IP, send immediate email, daily report… all based...

Learn more about Pyruse

  1. Fail2ban icon

    Fail2ban

    • FreeOpen Source
    • Linux

    Fail2ban scans log files (e.g. /var/log/apache/error_log) and bans IPs that show the malicious signs -- too many password failures, seeking for exploits, etc.

    Screenshot
  2. SSHGuard icon

    SSHGuard

    • FreeOpen Source
    • Mac
    • Linux

    SSHGuard monitors services through their logging activity. It reacts to messages about dangerous activity by blocking the source address with the local firewall.

    No screenshots yet


  3. Denyhosts icon

    Denyhosts

    • FreeOpen Source
    • Linux

    The idea of denying access to SSH servers is nothing new and I was inspired by many other scripts that I discovered. However, none of them did things the way I envisioned them to. Also, they were all shell scripts which do not offer the elegance of Python.

    No screenshots yet
  4. tallow

    • FreeOpen Source
    • Linux
    • GitHub

    Tallow is a fail2ban/lard replacement that uses systemd's native journal API to scan for attempted ssh logins, and issues temporary IP bans for clients that violate certain login patterns.

    No screenshots yet
  5. win2ban

    • Free PersonalProprietary
    • Windows

    win2ban is a Fail2ban implementation for Windows systems. It is a packaging of Fail2ban, Python, Cygwin, Winlogbeat and many other related tools to make it a complete and ready-to-use solution for brute-force attack protection.

    No screenshots yet
Showing 5 of 5 alternatives