{"id":88,"date":"2025-10-30T20:40:07","date_gmt":"2025-10-30T20:40:07","guid":{"rendered":"https:\/\/adveyer.com\/blog\/?p=88"},"modified":"2025-11-01T09:39:49","modified_gmt":"2025-11-01T09:39:49","slug":"linux-ip-banlama-ve-banlanan-ip-kaldirma","status":"publish","type":"post","link":"https:\/\/adveyer.com\/blog\/linux-ip-banlama-ve-banlanan-ip-kaldirma\/","title":{"rendered":"Linux IP Banlama ve Ban Kald\u0131rma Rehberi"},"content":{"rendered":"<p data-start=\"300\" data-end=\"310\">Merhaba,<\/p>\n<p data-start=\"312\" data-end=\"751\">Bu yaz\u0131m\u0131zda sizlere <strong data-start=\"333\" data-end=\"375\">Linux i\u015fletim sistemlerinde IP banlama<\/strong> i\u015fleminin nas\u0131l yap\u0131laca\u011f\u0131n\u0131 ve <strong data-start=\"408\" data-end=\"459\">banlanan bir IP adresinin nas\u0131l kald\u0131r\u0131laca\u011f\u0131n\u0131<\/strong> ad\u0131m ad\u0131m anlataca\u011f\u0131z.<br data-start=\"482\" data-end=\"485\" \/>Sunucu y\u00f6netimi yaparken, zaman zaman k\u00f6t\u00fc niyetli trafi\u011fi veya sald\u0131r\u0131 giri\u015fimlerini engellemek i\u00e7in belirli IP adreslerini yasaklaman\u0131z (banlaman\u0131z) gerekebilir.<br data-start=\"648\" data-end=\"651\" \/>Linux\u2019ta bu i\u015flem olduk\u00e7a kolayd\u0131r ve <strong data-start=\"689\" data-end=\"701\">iptables<\/strong> arac\u0131 sayesinde birka\u00e7 basit komutla yap\u0131labilir.<\/p>\n<h3 data-start=\"758\" data-end=\"794\">Linux IP Banlama (Engelleme) \u0130\u015flemi<\/h3>\n<p data-start=\"796\" data-end=\"910\">Linux sistemlerde <strong data-start=\"814\" data-end=\"826\">iptables<\/strong> kuruluysa, a\u015fa\u011f\u0131daki komutu kullanarak istedi\u011finiz IP adresini engelleyebilirsiniz:<\/p>\n<div class=\"contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary\">\n<pre class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"whitespace-pre! language-bash\">iptables -A INPUT -s BANLANACAK_IP -j DROP\r\n<\/code><\/pre>\n<\/div>\n<p data-start=\"968\" data-end=\"983\"><strong data-start=\"968\" data-end=\"981\">A\u00e7\u0131klama:<\/strong><\/p>\n<ul data-start=\"984\" data-end=\"1150\">\n<li data-start=\"984\" data-end=\"1024\">\n<p data-start=\"986\" data-end=\"1024\"><code data-start=\"986\" data-end=\"996\"><strong>-A INPUT<\/strong><\/code> : Gelen trafi\u011fi hedefler.<\/p>\n<\/li>\n<li data-start=\"1025\" data-end=\"1084\">\n<p data-start=\"1027\" data-end=\"1084\"><strong><code data-start=\"1027\" data-end=\"1045\">-s BANLANACAK_IP<\/code><\/strong> : Yasaklanacak IP adresini belirtir.<\/p>\n<\/li>\n<li data-start=\"1085\" data-end=\"1150\">\n<p data-start=\"1087\" data-end=\"1150\"><strong><code data-start=\"1087\" data-end=\"1096\">-j DROP<\/code><\/strong> : Bu IP\u2019den gelen t\u00fcm ba\u011flant\u0131 isteklerini yok sayar.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1152\" data-end=\"1167\"><strong data-start=\"1155\" data-end=\"1165\">\u00d6rnek:<\/strong><\/p>\n<div class=\"contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary\">\n<pre class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"whitespace-pre! language-bash\">iptables -A INPUT -s 192.168.1.100 -j DROP\r\n<\/code><\/pre>\n<\/div>\n<p data-start=\"1223\" data-end=\"1305\">Bu komut, <strong><code data-start=\"1233\" data-end=\"1248\">192.168.1.100<\/code><\/strong> IP adresinden gelen t\u00fcm ba\u011flant\u0131 isteklerini engeller.<\/p>\n<p data-start=\"1307\" data-end=\"1437\">Bu y\u00f6ntem \u00f6zellikle SSH sald\u0131r\u0131lar\u0131, spam g\u00f6nderimleri veya belirli IP\u2019lerden gelen yo\u011fun istekleri kesmek i\u00e7in olduk\u00e7a etkilidir.<\/p>\n<hr data-start=\"1439\" data-end=\"1442\" \/>\n<h3 data-start=\"1444\" data-end=\"1487\">Linux IP Ban Kald\u0131rma (Engeli A\u00e7ma) \u0130\u015flemi<\/h3>\n<p data-start=\"1489\" data-end=\"1593\">Yanl\u0131\u015fl\u0131kla engellenmi\u015f bir IP adresini serbest b\u0131rakmak isterseniz, a\u015fa\u011f\u0131daki komutu kullanabilirsiniz:<\/p>\n<div class=\"contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary\">\n<pre class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"whitespace-pre! language-bash\">iptables -D INPUT -s ACILACAK_IP -j DROP\r\n<\/code><\/pre>\n<\/div>\n<p data-start=\"1649\" data-end=\"1664\"><strong data-start=\"1649\" data-end=\"1662\">A\u00e7\u0131klama:<\/strong><\/p>\n<ul data-start=\"1665\" data-end=\"1809\">\n<li data-start=\"1665\" data-end=\"1729\">\n<p data-start=\"1667\" data-end=\"1729\"><code data-start=\"1667\" data-end=\"1671\"><strong>-D<\/strong><\/code> parametresi, belirtilen kural\u0131 <strong data-start=\"1703\" data-end=\"1721\">iptal (delete)<\/strong> eder.<\/p>\n<\/li>\n<li data-start=\"1730\" data-end=\"1809\">\n<p data-start=\"1732\" data-end=\"1809\"><code data-start=\"1732\" data-end=\"1745\"><strong>ACILACAK_IP<\/strong><\/code> yerine engelini kald\u0131rmak istedi\u011finiz IP adresini yazmal\u0131s\u0131n\u0131z.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1811\" data-end=\"1826\"><strong data-start=\"1814\" data-end=\"1824\">\u00d6rnek:<\/strong><\/p>\n<div class=\"contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary\">\n<pre class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"whitespace-pre! language-bash\">iptables -D INPUT -s 192.168.1.100 -j DROP\r\n<\/code><\/pre>\n<\/div>\n<p data-start=\"1882\" data-end=\"1951\">Bu komut, az \u00f6nce yasaklad\u0131\u011f\u0131m\u0131z IP adresinin engelini kald\u0131racakt\u0131r.<\/p>\n<h3 data-start=\"1958\" data-end=\"1988\">\u0130pu\u00e7lar\u0131 ve Ek Bilgiler<\/h3>\n<ul data-start=\"1990\" data-end=\"2622\">\n<li data-start=\"1990\" data-end=\"2299\">\n<p data-start=\"1992\" data-end=\"2116\"><strong data-start=\"1992\" data-end=\"2017\">Kal\u0131c\u0131 hale getirmek:<\/strong><br data-start=\"2017\" data-end=\"2020\" \/>iptables kurallar\u0131 sistem yeniden ba\u015flat\u0131ld\u0131\u011f\u0131nda s\u0131f\u0131rlanabilir. Kal\u0131c\u0131 hale getirmek i\u00e7in:<\/p>\n<div class=\"contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary\">\n<div class=\"sticky top-9\"><\/div>\n<pre class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"whitespace-pre! language-bash\">service iptables save\r\n<\/code><\/pre>\n<\/div>\n<p data-start=\"2159\" data-end=\"2165\">veya<\/p>\n<div class=\"contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary\">\n<div class=\"sticky top-9\"><\/div>\n<pre class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"whitespace-pre! language-bash\">iptables-save &gt; \/etc\/iptables\/rules.v4\r\n<\/code><\/pre>\n<\/div>\n<p data-start=\"2225\" data-end=\"2299\">komutlar\u0131n\u0131 kullanabilirsiniz (da\u011f\u0131t\u0131m\u0131n\u0131za g\u00f6re de\u011fi\u015fiklik g\u00f6sterebilir).<\/p>\n<\/li>\n<li data-start=\"2301\" data-end=\"2423\">\n<p data-start=\"2303\" data-end=\"2390\"><strong data-start=\"2303\" data-end=\"2330\">Kurallar\u0131 g\u00f6r\u00fcnt\u00fclemek:<\/strong><br data-start=\"2330\" data-end=\"2333\" \/>Sistemde aktif olan iptables kurallar\u0131n\u0131 g\u00f6rmek i\u00e7in:<\/p>\n<div class=\"contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary\">\n<div class=\"sticky top-9\">\n<div class=\"absolute end-0 bottom-0 flex h-9 items-center pe-2\">\n<div class=\"bg-token-bg-elevated-secondary text-token-text-secondary flex items-center gap-4 rounded-sm px-2 font-sans text-xs\"><\/div>\n<\/div>\n<\/div>\n<pre class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"whitespace-pre! language-bash\">iptables -L -n\r\n<\/code><\/pre>\n<\/div>\n<\/li>\n<li data-start=\"2425\" data-end=\"2622\">\n<p data-start=\"2427\" data-end=\"2576\"><strong data-start=\"2427\" data-end=\"2471\">UFW veya Firewalld kullanan sistemlerde:<\/strong><br data-start=\"2471\" data-end=\"2474\" \/>iptables yerine bu ara\u00e7larla IP banlama i\u015flemleri farkl\u0131 komutlarla yap\u0131labilir. \u00d6rne\u011fin UFW i\u00e7in:<\/p>\n<div class=\"contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary\">\n<div class=\"sticky top-9\">\n<div class=\"absolute end-0 bottom-0 flex h-9 items-center pe-2\">\n<div class=\"bg-token-bg-elevated-secondary text-token-text-secondary flex items-center gap-4 rounded-sm px-2 font-sans text-xs\"><\/div>\n<\/div>\n<\/div>\n<pre class=\"overflow-y-auto p-4\" dir=\"ltr\"><code class=\"whitespace-pre! language-bash\">ufw deny from 192.168.1.100\r\n<\/code><\/pre>\n<\/div>\n<\/li>\n<\/ul>\n<h3 data-start=\"2629\" data-end=\"2641\">Sonu\u00e7<\/h3>\n<p data-start=\"2643\" data-end=\"2861\">Bu yaz\u0131m\u0131zda Linux sistemlerde <strong data-start=\"2674\" data-end=\"2688\">IP banlama<\/strong> ve <strong>IP ban kald\u0131rma<\/strong> i\u015flemlerini ad\u0131m ad\u0131m \u00f6\u011frendik.<br data-start=\"2740\" data-end=\"2743\" \/>Bu basit ama etkili y\u00f6ntemle, sunucunuzu istenmeyen eri\u015fimlerden koruyabilir ve sistem g\u00fcvenli\u011finizi art\u0131rabilirsiniz.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Merhaba, Bu yaz\u0131m\u0131zda sizlere Linux i\u015fletim sistemlerinde IP banlama i\u015fleminin nas\u0131l yap\u0131laca\u011f\u0131n\u0131 ve banlanan bir IP adresinin nas\u0131l kald\u0131r\u0131laca\u011f\u0131n\u0131 ad\u0131m ad\u0131m anlataca\u011f\u0131z.Sunucu y\u00f6netimi yaparken, zaman zaman k\u00f6t\u00fc niyetli trafi\u011fi veya sald\u0131r\u0131 giri\u015fimlerini engellemek i\u00e7in belirli IP adreslerini yasaklaman\u0131z (banlaman\u0131z) gerekebilir.Linux\u2019ta bu i\u015flem olduk\u00e7a kolayd\u0131r ve iptables arac\u0131 sayesinde birka\u00e7 basit komutla yap\u0131labilir. Linux IP Banlama [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43],"tags":[],"class_list":["post-88","post","type-post","status-publish","format-standard","hentry","category-linux-genel"],"_links":{"self":[{"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/posts\/88","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/comments?post=88"}],"version-history":[{"count":3,"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/posts\/88\/revisions"}],"predecessor-version":[{"id":91,"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/posts\/88\/revisions\/91"}],"wp:attachment":[{"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/media?parent=88"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/categories?post=88"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/tags?post=88"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}