IP Reputation and Network Intelligence Monitoring
IPXA is a high-performance, private-by-design platform for threat intelligence aggregation. It provides instant IP reputation queries, GeoIP data, and integration with 15+ Real-time Blackhole Lists (RBLs), all running entirely on your own infrastructure.
Instantly visualize the origin and risk score of any IP address with our premium web dashboard.
Multi-workspace environment for isolated security configurations.
- π Ultra-low Latency: Sub-5ms response times.
- π 100% Private: Runs entirely on your infrastructure.
- π° Zero Cost: No per-request fees or subscription limits.
- π Air-gap Ready: Optimized for restricted and high-security environments.
The administrative interface is accessible at the /admin context. It features a secure login system and a one-click logout to ensure session security in shared environments.
You can configure the access credentials using the following environment variables:
- ADMIN_EMAIL: Administrator email (Default:
admin@local) - ADMIN_PASSWORD: Administrator password (Default:
admin)
Manage your feeds, workspaces, and monitoring data through a premium, dark-mode administrative interface with secure session management.
- π Intelligent GeoIP: Local integration with MaxMind and ip2asn for lightning-fast lookups.
- π« RBL Orchestration: Dynamic management of 15+ threat feed sources (Reputation & Bypass).
- β‘ Multiple API Flavors: Specialized endpoints for exhaustive data, security checks, or high-speed header-based responses.
- π’ Multi-Workspace: Isolate configurations and API keys across different environments or clients.
- π¨ Admin Dashboard: High-contrast, dark-mode interface for real-time monitoring and data management.
IPXA is distributed as a lightweight Docker image.
services:
ipxa:
image: liberatti/ipxa:latest
container_name: ipxa
# environment:
# - IBLOCKLIST_USERNAME=
# - IBLOCKLIST_PASSWORD=
# - MAXMIND_ACCOUNT_ID=
# - MAXMIND_LICENSE_KEY=
volumes:
- ipxa_data:/data
ports:
- "5000:5000"
restart: always
deploy:
resources:
limits:
memory: 256M
volumes:
ipxa_data:IPXA provides native, high-performance middleware hooks for popular web servers, allowing you to block malicious traffic at the edge. These hooks support standardized JSON error responses with unique request_id tracking for enhanced observability.
Integrate IPXA directly into your Apache configuration using mod_lua to evaluate IPs on the fly.
Quick Setup:
- Install
mod_luaandlua-socket(e.g.,yum install httpd mod_lua lua-socket). - Copy
hooks/httpd/lua/*.luato your Apache lua directory (e.g.,/etc/httpd/lua/). - Update
/etc/httpd/lua/config.luawith your IPXA API URL and settings. - Hook into your
VirtualHost:<VirtualHost *:80> ServerName example.com DocumentRoot /var/www/html # IPXA Access Control LuaHookAccessChecker /etc/httpd/lua/ipxa.lua ip_info_check # IPXA JSON Error Handler Alias /errors /etc/httpd/lua/errors.lua <Location /errors> SetHandler lua-script </Location> ErrorDocument 403 /errors </VirtualHost>
(See hooks/httpd/README.md for full details).
Leverage the power of Lua in Nginx via OpenResty for ultra-low latency IP checking, complete with local caching.
Quick Setup:
- Install the
lua-resty-httppackage (vialuarocks). - Copy the contents of
hooks/openresty/lua/to your OpenRestylualibpath (e.g.,/usr/local/openresty/lualib/ipxa/). - Update
config.luawith your IPXA API URL and blocklist settings. - Configure your
nginx.conf:http { # ... lua_package_path "/usr/local/openresty/lualib/ipxa/?.lua;;"; lua_shared_dict ip_cache 10m; # Required for caching server { # ... error_page 403 /lua-error; location / { access_by_lua_file /usr/local/openresty/lualib/ipxa/ip_info_check.lua; } location = /lua-error { internal; content_by_lua_file /usr/local/openresty/lualib/ipxa/errors.lua; } } }
(Check hooks/openresty/nginx.conf and hooks/openresty/Dockerfile for working examples).
When a request is blocked, the hooks return a machine-readable JSON response instead of default HTML error pages. This ensures consistent error handling for both browsers and API clients.
Example Blocked Response:
{
"error": "Forbidden",
"status": 403,
"request_id": "b10ed3a6f76ad62a75a956ce3e922336",
"message": "ipxa [block/risk-score]: 172.20.0.1 risk_score=14"
}GET /api/ip/info/{address}
Returns comprehensive GeoIP, ASN, and reputation data.
Example Response:
{
"ip": {
"address": "14.152.94.1",
"broadcast": "14.152.95.255",
"network": "14.152.80.0",
"prefix": 20,
"version": 4
},
"location": {
"continent": "Asia",
"country_code": "CN",
"country_name": "China"
},
"organization": {
"asn_description": "",
"asn_name": "CT-DONGGUAN-IDC CHINANET Guangdong province network",
"asn_number": 134763
},
"security": {
"reasons": [
"rbl:firehol_level1"
],
"risk_score": 0
}
}GET /api/ip/check/{address}
Simplified response focused on reputation and risk assessment.
Example Response:
{
"ip": "14.152.94.1",
"risk_score": 0,
"reasons": ["rbl:firehol_level1"]
}GET /api/ip/quick/{address}
Optimized for firewalls and middleware. Returns risk score in body and x-risk-score header.
Example Response:
{
"risk_score": 9
}IPXA includes an api.rest file for rapid API testing.
- VS Code: Install the REST Client extension.
- Run: Open
api.restand clickSend Requestabove any endpoint. - Explore: Use these examples as a baseline for your own integrations.
While advanced users can still add JSON files in config/, IPXA now features a complete Admin Panel to manage feeds dynamically through the UI.
| Field | Description |
|---|---|
name |
Human-friendly identifier for the feed |
slug |
Unique internal identifier |
type |
reputation (for blocking) or bypass (for allowlisting) |
source |
Public URL for download (CIDR or IP list) |
format |
cdir_text (plain text) or cdir_gz (compressed) |
risk_score |
Weight of this feed in the final decision (0-10) |
Includes a pre-configured library of industry-standard feeds:
- FireHOL Level 1-4: Highly curated aggregation.
- Cisco Talos & DShield: Global threat intelligence.
- Abuse.ch Feodo: Botnet C2 tracking.
- Spamhaus DROP: SBL Advisory blocks.
- Emerging Threats: Known compromised hosts.
- Blocklist.de & GreenSnow: SSH/Mail brute force.
Disclaimer of Warranty: This software is provided "AS IS", without warranty of any kind, express or implied. The author(s) and contributor(s) shall not be liable for any claim, damages, or other liability, whether in an action of contract, tort, or otherwise, arising from, out of, or in connection with the software or the use or other dealings in the software.
Use at Your Own Risk: You are solely responsible for any decisions made or actions taken based on the data provided by IPXA. The software involves security-related functions; its misconfiguration or misuse could lead to service disruption or security gaps.
This project is licensed under the Apache License 2.0. See the LICENSE file for details.