RAPID REAKTOR
System Status: Active Defense

Your Firewall Should Block Attackers Automatically. Now It Can.

The average manual block takes 15–30 minutes. Rapid Reaktor does it in seconds. Self-hosted, configurable, and auditable down to the source alert that triggered every single block.

monitor_heart Recent Activity
+ added 45.76.112.34 → ssh-blocklist 2s ago
+ added 91.134.22.187 → brute-force 5s ago
+ added 185.220.101.53 → vpn-threats 12s ago
+ added 77.88.55.241 → ssh-blocklist 28s ago
+ added 162.55.18.247 → brute-force 45s ago
+ added 51.89.153.112 → ssh-blocklist 1m ago
Total Rules
23
Active Rules
18
Total Actions
1,847
Actions (24h)
92

From Detection to Block in Seconds

Turn firewall events into instant enforcement automatically. No scripts. No delays. No analyst bottlenecks.

warning

Detection

Palo Alto Firewall

Attack activity is detected in real time
No dashboards, no waiting, no manual triage

bolt

Automated Response

Rapid Reaktor Engine

Extracts attacker IPs instantly
Builds and updates block lists automatically
No scripts. No analyst bottlenecks.

shield

Instant Blocking

Your Firewall

Firewall enforces blocks automatically
Attackers are stopped before they retry or pivot

autorenew

Continuous Defense

Always Active

Every new attack strengthens your defense
Your block lists evolve in real time

How It Works

No agents. No complex integrations. No humans in the loop.

Auto-Extract IPs

Rapid Reaktor pulls the right IP from raw syslog output, even in NAT and proxy environments where the attacker's real address is buried. No per-rule regex tuning. No manual cleanup. It finds the IP that matters and acts on it.

Dynamic EDL Management

Rapid Reaktor hosts your EDL directly. It's the authoritative blocklist server your Palo Alto firewall already points at. When an IP gets added, your firewall picks it up on the next poll with zero extra configuration. No API keys to manage. No third-party sync to trust.

Docker Deployable

Two ports. One Docker Compose command. Runs on the machine you already have. No vendor onboarding, no complex dependencies, no cloud data leaving your network. You're up and blocking within the hour.

Granular Trigger Logic

Configure exactly what triggers a block: alert type, threshold count, regex pattern, source. Require three hits before an IP gets added. Scope rules to specific firewall sources. Suppress noisy alerts that would create false positives. You control what gets blocked and why.

Smart TTL Management

Every blocked IP expires automatically on the schedule you set. No permanent blocklist bloat. No forgotten entries locking out a legitimate user six months later. Blocks are temporary by default. You decide how long they last.

Audit & Compliance Logging

Every automated block is recorded: the alert that triggered it, the rule that matched, the IP that got added, and the exact timestamp. Nothing is a black box. When someone asks why an IP was blocked, you have a complete answer in seconds. Export to CSV for incident reviews or compliance audits.

View the Audit Log Schema →