Linux vps-61133.fhnet.fr 4.9.0-19-amd64 #1 SMP Debian 4.9.320-2 (2022-06-30) x86_64
Apache/2.4.25 (Debian)
Server IP : 93.113.207.21 & Your IP : 216.73.216.35
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
etc /
fail2ban /
filter.d /
Delete
Unzip
Name
Size
Permission
Date
Action
ignorecommands
[ DIR ]
drwxr-xr-x
2022-11-21 13:39
3proxy.conf
442
B
-rw-r--r--
2016-12-09 15:48
apache-antibot.conf
576
B
-rw-r--r--
2022-12-15 12:19
apache-auth.conf
3.17
KB
-rw-r--r--
2016-12-09 15:48
apache-badbots.conf
2.68
KB
-rw-r--r--
2016-12-09 15:48
apache-botsearch.conf
1.24
KB
-rw-r--r--
2016-12-09 15:48
apache-common.conf
813
B
-rw-r--r--
2016-12-09 15:48
apache-fakegooglebot.conf
268
B
-rw-r--r--
2016-12-09 15:48
apache-get-dos.conf
680
B
-rw-r--r--
2022-11-22 18:57
apache-modsecurity.conf
487
B
-rw-r--r--
2016-12-09 15:48
apache-nohome.conf
596
B
-rw-r--r--
2016-12-09 15:48
apache-noscript.conf
1.16
KB
-rw-r--r--
2016-12-09 15:48
apache-overflows.conf
1.95
KB
-rw-r--r--
2016-12-09 15:48
apache-pass.conf
346
B
-rw-r--r--
2016-12-09 15:48
apache-shellshock.conf
1014
B
-rw-r--r--
2016-12-09 15:48
assp.conf
3.34
KB
-rw-r--r--
2016-12-09 15:48
asterisk.conf
2.39
KB
-rw-r--r--
2016-12-09 15:48
botsearch-common.conf
520
B
-rw-r--r--
2016-12-09 15:48
common.conf
1.82
KB
-rw-r--r--
2016-12-09 15:48
counter-strike.conf
252
B
-rw-r--r--
2016-12-09 15:48
courier-auth.conf
393
B
-rw-r--r--
2016-12-09 15:48
courier-smtp.conf
490
B
-rw-r--r--
2016-12-09 15:48
custom-iptables.conf
212
B
-rw-r--r--
2023-03-10 12:17
cyrus-imap.conf
443
B
-rw-r--r--
2016-12-09 15:48
directadmin.conf
345
B
-rw-r--r--
2016-12-09 15:48
dolibarr-forgot.conf
113
B
-rw-r--r--
2025-11-25 11:03
dovecot.conf
1.83
KB
-rw-r--r--
2016-12-09 15:48
dropbear.conf
1.66
KB
-rw-r--r--
2016-12-09 15:48
drupal-auth.conf
557
B
-rw-r--r--
2016-12-09 15:48
ejabberd-auth.conf
1.25
KB
-rw-r--r--
2016-12-09 15:48
exim-common.conf
423
B
-rw-r--r--
2016-12-09 15:48
exim-spam.conf
2.11
KB
-rw-r--r--
2016-12-09 15:48
exim.conf
1.77
KB
-rw-r--r--
2016-12-09 15:48
freeswitch.conf
963
B
-rw-r--r--
2016-12-09 15:48
froxlor-auth.conf
1.18
KB
-rw-r--r--
2016-12-09 15:48
groupoffice.conf
236
B
-rw-r--r--
2016-12-09 15:48
gssftpd.conf
322
B
-rw-r--r--
2016-12-09 15:48
guacamole.conf
512
B
-rw-r--r--
2016-12-09 15:48
haproxy-http-auth.conf
1.13
KB
-rw-r--r--
2016-12-09 15:48
horde.conf
404
B
-rw-r--r--
2016-12-09 15:48
kerio.conf
482
B
-rw-r--r--
2016-12-09 15:48
lighttpd-auth.conf
323
B
-rw-r--r--
2016-12-09 15:48
mongodb-auth.conf
2.23
KB
-rw-r--r--
2016-12-09 15:48
monit.conf
773
B
-rw-r--r--
2016-12-09 15:48
murmur.conf
652
B
-rw-r--r--
2016-12-09 15:48
mysqld-auth.conf
891
B
-rw-r--r--
2016-12-09 15:48
nagios.conf
400
B
-rw-r--r--
2016-12-09 15:48
named-refused.conf
1.56
KB
-rw-r--r--
2016-12-09 15:48
nginx-auth.conf
143
B
-rw-r--r--
2023-03-10 12:20
nginx-botsearch.conf
528
B
-rw-r--r--
2016-12-09 15:48
nginx-http-auth.conf
442
B
-rw-r--r--
2016-12-09 15:48
nginx-limit-req.conf
1.39
KB
-rw-r--r--
2016-12-09 15:48
nsd.conf
707
B
-rw-r--r--
2016-12-09 15:48
openhab.conf
459
B
-rw-r--r--
2016-12-09 15:48
openwebmail.conf
495
B
-rw-r--r--
2016-12-09 15:48
oracleims.conf
1.86
KB
-rw-r--r--
2016-12-09 15:48
pam-generic.conf
814
B
-rw-r--r--
2016-12-09 15:48
perdition.conf
568
B
-rw-r--r--
2016-12-09 15:48
php-url-fopen.conf
834
B
-rw-r--r--
2016-12-09 15:48
portsentry.conf
188
B
-rw-r--r--
2016-12-09 15:48
postfix-rbl.conf
454
B
-rw-r--r--
2016-12-09 15:48
postfix-sasl.conf
482
B
-rw-r--r--
2016-12-09 15:48
postfix.conf
1.26
KB
-rw-r--r--
2016-12-09 15:48
proftpd.conf
1.19
KB
-rw-r--r--
2016-12-09 15:48
pure-ftpd.conf
2.35
KB
-rw-r--r--
2016-12-09 15:48
qmail.conf
795
B
-rw-r--r--
2016-12-09 15:48
recidive.conf
1.26
KB
-rw-r--r--
2016-12-09 15:48
roundcube-auth.conf
1.33
KB
-rw-r--r--
2016-12-09 15:48
screensharingd.conf
821
B
-rw-r--r--
2016-12-09 15:48
selinux-common.conf
517
B
-rw-r--r--
2016-12-09 15:48
selinux-ssh.conf
570
B
-rw-r--r--
2016-12-09 15:48
sendmail-auth.conf
330
B
-rw-r--r--
2016-12-09 15:48
sendmail-reject.conf
2.37
KB
-rw-r--r--
2016-12-09 15:48
sieve.conf
371
B
-rw-r--r--
2016-12-09 15:48
slapd.conf
706
B
-rw-r--r--
2016-12-09 15:48
sogo-auth.conf
472
B
-rw-r--r--
2016-12-09 15:48
solid-pop3d.conf
1.07
KB
-rw-r--r--
2016-12-09 15:48
squid.conf
206
B
-rw-r--r--
2016-12-09 15:48
squirrelmail.conf
199
B
-rw-r--r--
2016-12-09 15:48
sshd-ddos.conf
761
B
-rw-r--r--
2016-12-09 15:48
sshd.conf
3.09
KB
-rw-r--r--
2016-12-09 15:48
stunnel.conf
363
B
-rw-r--r--
2016-12-09 15:48
suhosin.conf
645
B
-rw-r--r--
2016-12-09 15:48
tine20.conf
821
B
-rw-r--r--
2016-12-09 15:48
uwimap-auth.conf
374
B
-rw-r--r--
2016-12-09 15:48
vsftpd.conf
637
B
-rw-r--r--
2016-12-09 15:48
webmin-auth.conf
444
B
-rw-r--r--
2016-12-09 15:48
wuftpd.conf
520
B
-rw-r--r--
2016-12-09 15:48
xinetd-fail.conf
503
B
-rw-r--r--
2016-12-09 15:48
Save
Rename
# Fail2Ban filter for openssh # # If you want to protect OpenSSH from being bruteforced by password # authentication then get public key authentication working before disabling # PasswordAuthentication in sshd_config. # # # "Connection from <HOST> port \d+" requires LogLevel VERBOSE in sshd_config # [INCLUDES] # Read common prefixes. If any customizations available -- read them from # common.local before = common.conf [Definition] _daemon = sshd failregex = ^%(__prefix_line)s(?:error: PAM: )?[aA]uthentication (?:failure|error|failed) for .* from <HOST>( via \S+)?\s*$ ^%(__prefix_line)s(?:error: PAM: )?User not known to the underlying authentication module for .* from <HOST>\s*$ ^%(__prefix_line)sFailed \S+ for (?P<cond_inv>invalid user )?(?P<user>(?P<cond_user>\S+)|(?(cond_inv)(?:(?! from ).)*?|[^:]+)) from <HOST>(?: port \d+)?(?: ssh\d*)?(?(cond_user):|(?:(?:(?! from ).)*)$) ^%(__prefix_line)sROOT LOGIN REFUSED.* FROM <HOST>\s*$ ^%(__prefix_line)s[iI](?:llegal|nvalid) user .*? from <HOST>(?: port \d+)?\s*$ ^%(__prefix_line)sUser .+ from <HOST> not allowed because not listed in AllowUsers\s*$ ^%(__prefix_line)sUser .+ from <HOST> not allowed because listed in DenyUsers\s*$ ^%(__prefix_line)sUser .+ from <HOST> not allowed because not in any group\s*$ ^%(__prefix_line)srefused connect from \S+ \(<HOST>\)\s*$ ^%(__prefix_line)s(?:error: )?Received disconnect from <HOST>: 3: .*: Auth fail(?: \[preauth\])?$ ^%(__prefix_line)sUser .+ from <HOST> not allowed because a group is listed in DenyGroups\s*$ ^%(__prefix_line)sUser .+ from <HOST> not allowed because none of user's groups are listed in AllowGroups\s*$ ^(?P<__prefix>%(__prefix_line)s)User .+ not allowed because account is locked<SKIPLINES>(?P=__prefix)(?:error: )?Received disconnect from <HOST>: 11: .+ \[preauth\]$ ^(?P<__prefix>%(__prefix_line)s)Disconnecting: Too many authentication failures for .+? \[preauth\]<SKIPLINES>(?P=__prefix)(?:error: )?Connection closed by <HOST> \[preauth\]$ ^(?P<__prefix>%(__prefix_line)s)Connection from <HOST> port \d+(?: on \S+ port \d+)?<SKIPLINES>(?P=__prefix)Disconnecting: Too many authentication failures for .+? \[preauth\]$ ^%(__prefix_line)s(error: )?maximum authentication attempts exceeded for .* from <HOST>(?: port \d*)?(?: ssh\d*)? \[preauth\]$ ^%(__prefix_line)spam_unix\(sshd:auth\):\s+authentication failure;\s*logname=\S*\s*uid=\d*\s*euid=\d*\s*tty=\S*\s*ruser=\S*\s*rhost=<HOST>\s.*$ ignoreregex = [Init] # "maxlines" is number of log lines to buffer for multi-line regex searches maxlines = 10 journalmatch = _SYSTEMD_UNIT=sshd.service + _COMM=sshd # DEV Notes: # # "Failed \S+ for .*? from <HOST>..." failregex uses non-greedy catch-all because # it is coming before use of <HOST> which is not hard-anchored at the end as well, # and later catch-all's could contain user-provided input, which need to be greedily # matched away first. # # Author: Cyril Jaquier, Yaroslav Halchenko, Petr Voralek, Daniel Black