IP Address List is based on detecting port scans through traps, as well as random connections to the dude server or the Mikrotik itself. To add in automatic mode, you just need to create a script in Mikrotik. The script will also add a rule to the firewall to automatically block requests from the IP address list.
/tool fetch url="https://raw.githubusercontent.com/Serp07/dude_blacklist_ip/main/dude_blacklist.rsc" mode=https dst-path=dude_blacklist.rsc
:delay 2
/import file=dude_blacklist.rsc
:if ([:len [/ip firewall filter find comment="AUTO_BLACKLIST_DROP"]] = 0) do={
/ip firewall filter add \
chain=forward \
in-interface=ether1 \
src-address-list=Dude_blacklist \
action=drop \
comment="AUTO_BLACKLIST_DROP" \
}
}
Next, you need to start a scheduler and define the interval at which the script will automatically run. Go to System > Scheduler > Add > "name your script"