Result for 002CF450D31A17B586FD926A83C0926DDCA8A94E

Query result

Key Value
FileName./usr/lib/python3/dist-packages/fail2ban/tests/utils.py
FileSize29852
MD5E44795836454518F98DAEFB0E08B0A3E
SHA-1002CF450D31A17B586FD926A83C0926DDCA8A94E
SHA-256FF54C90C50C1C19D66C363E40F596646E5A35C48C630B1CA8D85EBF1BF723856
SSDEEP768:uYduEF4jqaFHOgzZ6653HRiDquUMTgrdSenkuYZZ:jurE65XRiquU3BnkuYn
TLSHT1A9D2E77DE22F1FA3362114A85C1D1552BB7DC1AA852C0663ACFDC72932C087395BADED
hashlookup:parent-total2
hashlookup:trust60

Network graph view

Parents (Total: 2)

The searched file hash is included in 2 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize374788
MD5F1C795F478B1DEB107A846A693E74846
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, proftpd, sasl, etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables/nftables -- default installation uses iptables for banning. nftables is also supported. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.11.1-2
SHA-122A3162C7CAD5CD6844522A9328D4C9ABABEDBF9
SHA-2569183DEFD12C02005CE7DB5CE2830DFA1E6D1160D639BCDBDBBFB99DDCAAB8070
Key Value
FileSize374672
MD5394CF995FA2DB4F91DAA4F0A52D35660
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, proftpd, sasl, etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables/nftables -- default installation uses iptables for banning. nftables is also supported. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.11.1-1
SHA-15D1F9F26E1A100E0CB042C0E778B608E61ABBF3D
SHA-2563C9D9F501710269F43A6C6EA756ED42D6E45F58790A1588E4DF45898BC9D7CCC