Result for 009B3C2C1DE6A25526F03F27378273531FFD4FD4

Query result

Key Value
FileName./etc/fail2ban/filter.d/monit.conf
FileSize767
MD5AD75E2B578F95E2E7010E988FEAE79E9
SHA-1009B3C2C1DE6A25526F03F27378273531FFD4FD4
SHA-256FF25A4A238F93FE512954B9F782E4B3D410361371B9549A7C84CC59A79A8CD55
SSDEEP12:E1ePJZahC5xQbWHilQzcIuohKGfTWCSD3rWIDgfsyqpXSvP3HGI29SbLKkyqpXSk:E1ePCgLQb+/9sGfTj0rWQgfsrp0vGI2G
TLSHT1F701D0C3A77C256606237390B860C303BB9DF14239461B617E6C629C67BA54E836F716
hashlookup:parent-total16
hashlookup:trust100

Network graph view

Parents (Total: 16)

The searched file hash is included in 16 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD57A63A6417B45D4401990BD7AF67FCBB4
PackageArchnoarch
PackageDescriptionThis package contains the core server components for Fail2Ban with minimal dependencies. You can install this directly if you want to have a small installation and know what you are doing.
PackageMaintainerFedora Project
PackageNamefail2ban-server
PackageRelease10.el8
PackageVersion0.11.1
SHA-106113017F08B4A5FA5091060926580E041371B82
SHA-256DDA1F81602A305C9CD37C557F9EC4AC1FDCB6E5569B086F23C33EC7E5039C237
Key Value
FileSize374788
MD5F1C795F478B1DEB107A846A693E74846
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, proftpd, sasl, etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables/nftables -- default installation uses iptables for banning. nftables is also supported. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.11.1-2
SHA-122A3162C7CAD5CD6844522A9328D4C9ABABEDBF9
SHA-2569183DEFD12C02005CE7DB5CE2830DFA1E6D1160D639BCDBDBBFB99DDCAAB8070
Key Value
MD5C63BBF6119AA09145D83E865CA4EE0F9
PackageArchnoarch
PackageDescriptionFail2ban scans log files like /var/log/messages and bans IP addresses that makes too many password failures. It updates firewall rules to reject the IP address, can send e-mails, or set host.deny entries. These rules can be defined by the user. Fail2Ban can read multiple log files such as sshd or Apache web server ones.
PackageMaintainerhttps://bugs.opensuse.org
PackageNamefail2ban
PackageReleaselp151.1.1
PackageVersion0.10.4
SHA-122C8D2DF4281F69862D943291BB587A6CB25893D
SHA-2566BF6CD98B89F11DDA2F90FCFAC6604648636B41F160C2C242378EF3FD222FBA5
Key Value
MD5C3F9D0417942EC6CF3938FFC895A8502
PackageArchnoarch
PackageDescriptionFail2ban scans log files like /var/log/messages and bans IP addresses that makes too many password failures. It updates firewall rules to reject the IP address, can send e-mails, or set host.deny entries. These rules can be defined by the user. Fail2Ban can read multiple log files such as sshd or Apache web server ones.
PackageMaintainerhttps://bugs.opensuse.org
PackageNamefail2ban
PackageReleaselp152.2.3
PackageVersion0.10.4
SHA-14EA09D47C62DD200E532FD9AD6E3A72E59715D14
SHA-2569C983F6776B735C8A1CE6D34A7751E67BA35C49AE8EB06599F8432CA905BD339
Key Value
MD5BD298DD412389E17C78E8CD5BCF7D2F4
PackageArchnoarch
PackageDescriptionThis package contains the core server components for Fail2Ban with minimal dependencies. You can install this directly if you want to have a small installation and know what you are doing.
PackageMaintainerFedora Project
PackageNamefail2ban-server
PackageRelease10.fc33
PackageVersion0.11.1
SHA-15B598E3552440429939B8AC4AA144B4A8FE21F47
SHA-2564F84496BE76DC851C9BE5E648C832856A7C8C26D8317E975F24870739006D49D
Key Value
FileSize374672
MD5394CF995FA2DB4F91DAA4F0A52D35660
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, proftpd, sasl, etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables/nftables -- default installation uses iptables for banning. nftables is also supported. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.11.1-1
SHA-15D1F9F26E1A100E0CB042C0E778B608E61ABBF3D
SHA-2563C9D9F501710269F43A6C6EA756ED42D6E45F58790A1588E4DF45898BC9D7CCC
Key Value
MD57430238509FB8C7E2155D769E6C98F9A
PackageArchnoarch
PackageDescriptionThis package contains the core server components for Fail2Ban with minimal dependencies. You can install this directly if you want to have a small installation and know what you are doing.
PackageMaintainerFedora Project
PackageNamefail2ban-server
PackageRelease10.el7
PackageVersion0.11.1
SHA-15DB90BB40668D6A0E3400BB84AE9E25C7D031B2D
SHA-2566615448D46ADE75EA64A8AF7C1A46A0D330223D50690401C8FE7085FD27EAD6D
Key Value
MD5FB0C285BFC950FB85FE267C7B46245C8
PackageArchnoarch
PackageDescriptionThis package contains the core server components for Fail2Ban with minimal dependencies. You can install this directly if you want to have a small installation and know what you are doing.
PackageMaintainerFedora Project
PackageNamefail2ban-server
PackageRelease4.fc32
PackageVersion0.11.1
SHA-16045DBDAE9957130316639894F5354F06C066F2A
SHA-256A0B13BCCC8EDD7F8022045C8A558E098F78FEFC715F4C1C5D9F7CC3077CD7B25
Key Value
FileSize329392
MD540EF3A3CA5EE887846A88FE947E0C220
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables/nftables -- default installation uses iptables for banning. nftables is also suported. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.10.2-2
SHA-1629EA6CFF5E20C2686B533BDB1F01D3D6A87BFF5
SHA-256F2B301028038A12E3C7E20579D75D2A75CC01CE836A1771F364EBCEBB3869B13
Key Value
FileSize385708
MD5C6D10419667B95F6E1CD122178E5B6C4
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables/nftables -- default installation uses iptables for banning. nftables is also suported. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerYaroslav Halchenko <debian@onerussian.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.10.2-2~bpo9+1
SHA-1701288400DBE6748D37F52C4A11B2AC2BE616CD3
SHA-256BF194A3C43450F3E1D01030F97425D04CC806ACFF744BC7BE08B52511C33725E