Hi - those lines will be the various login (attack) attempts, it’s fail2ban saying “I looked through the sshd log file and I found an attempt from w.x.y.z at time …”.
Fail2ban doesn’t actually ban an address until a certain number of attempts (I think MIAB has it set at 5) within a certain time interval (10 mins).
And fail2ban looks through various log files, corresponding to various services that might be attacked, so you’ll see [sshd] (being ssh login attempts, logged in auth.log), and so on. The details of what is checked is in /etc/fail2ban/jail.conf.
Thanks for the reply, but can you clarify where is the record/log of what has actually been banned? (I view auth.log routinely anyway if I want to see login attempts).
The location is in the /var/log/fail2ban.log After an ip has made enough attempts to trigger a ban it will be in that log and look like this:
2020-10-18 07:27:06,179 fail2ban.filter [875]: INFO [sshd] Found 3.18.220.223 - 2020-10-18 07:27:06
2020-10-18 07:27:06,207 fail2ban.actions [875]: NOTICE [sshd] Ban 3.18.220.223
This is an actual copy of an entry from my fail2ban.log
You can change the number of attempts in x number of mins to trigger a ban so that a ban will happen quicker.