Result for 033D08B4DA62F63943DA00AAE9EAB98CE3D0E7C6

Query result

Key Value
FileName./usr/lib/python3/dist-packages/fail2ban/server/filterpyinotify.py
FileSize6410
MD561D684352605FC97B2140ADD50552E0A
SHA-1033D08B4DA62F63943DA00AAE9EAB98CE3D0E7C6
SHA-256A0AA9F526F7E2BE2BDA10841CF317DF83F43BA1BB630EDF96CF233FA88BE7D9D
SSDEEP96:q7NzYWpmzFfxD0L/WYE81Trb2CgJnT4AFHonYaAcORx79zsq:uYHkL/jynTnQ1Gh7
TLSHT1ADD1B6FDD24FE9A5D42B535FB238501BAE7FC4F2533D65003EBAA26812025231279CE4
hashlookup:parent-total10
hashlookup:trust100

Network graph view

Parents (Total: 10)

The searched file hash is included in 10 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD58C7381A82C5F83F2C3A7F1A2A115B16E
PackageArchnoarch
PackageDescriptionFail2ban scans log files like /var/log/pwdfail or /var/log/apache/error_log and bans IP that makes too many password failures. It updates firewall rules to reject the IP address. To use the hostsdeny and shorewall actions you must install tcp_wrappers and shorewall respectively.
PackageMaintainerFedora Project
PackageNamefail2ban
PackageRelease1.el6.1
PackageVersion0.9.6
SHA-182976B33BE986F928F3B895B3CE9CEEA59773356
SHA-2565494D678669606897C1CFB851921A8833797F6F697822AA68A1ACA03FA7D942B
Key Value
FileSize244164
MD55C635C14D4404EF2EF4C943EDA15ED16
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.6-1
SHA-1F64D159FE5506D5931EBC5F2BBC1D9D621CCE895
SHA-2566F30F9E522BEE2D7724FBC32F7704FCB97252915B04AB796D69C3FE7E2AFE36D
Key Value
CRC32A384B5E1
FileName19979
FileSize227028
MD5D4EEDCCF04345C9F642391F7ADCECB86
OpSystemCode362
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.3-1
ProductCode184814
RDS:package_id184814
SHA-15036D57B893C077059EDAA930B763BBC5F180F05
SHA-25677956AE0E2809BBBB6E76F7E228A3B453A4A8DD9F005E812BACD708714DDDB8C
SpecialCode
dbnsrl_legacy
insert-timestamp1648751507.4833016
sourceRDS_2022.03.1_legacy.db
Key Value
MD5ADC85DB498A8817F65B419BD83F11723
PackageArchnoarch
PackageDescriptionThis package contains the core server components for Fail2Ban with minimal dependencies. You can install this directly if you want to have a small installation and know what you are doing.
PackageMaintainerFedora Project
PackageNamefail2ban-server
PackageRelease3.fc24
PackageVersion0.9.3
SHA-18000E8B588818EDBF21A1BE8E105FE88D14AB22F
SHA-256D7AAFEE94F0EBE9799455EB49EEAD76C882DFC4ED53598C28B65053C678997B9
Key Value
MD584644A1819D9AD33C6EC6560B19488AD
PackageArchnoarch
PackageDescriptionThis package contains the core server components for Fail2Ban with minimal dependencies. You can install this directly if you want to have a small installation and know what you are doing.
PackageMaintainerFedora Project
PackageNamefail2ban-server
PackageRelease3.fc24
PackageVersion0.9.3
SHA-1A056C8900481FB74671B76C6AFBE7B1C4F3D830B
SHA-256CA5E36FFB1ED06B3AE385D7B7B78249F8AACE0249BEE32EF199B7DE8C95022EE
Key Value
MD57DEB4D97509EF595A3B2AE8B2DADD33E
PackageArchnoarch
PackageDescriptionThis package contains the core server components for Fail2Ban with minimal dependencies. You can install this directly if you want to have a small installation and know what you are doing.
PackageMaintainerFedora Project
PackageNamefail2ban-server
PackageRelease1.el7
PackageVersion0.9.7
SHA-17AEDC73283CB2965D4AD88919143553E38A69FE9
SHA-256FF460F1595C970B55F4249CC0CA22BE14604B968EAA1E5D790F364FD9B820674
Key Value
MD523598ACABD0BF151FE8AA55FE98406DA
PackageArchnoarch
PackageDescriptionThis package contains the core server components for Fail2Ban with minimal dependencies. You can install this directly if you want to have a small installation and know what you are doing.
PackageMaintainerCBS <cbs@centos.org>
PackageNamefail2ban-server
PackageRelease1.el7
PackageVersion0.9.7
SHA-110BEF8241FF556BB03B6EEA32B91988824871A82
SHA-2565ED3325C027F979D43E761D5DBE26A4FB001E4AB2C542560553F22DE5BBD0E25
Key Value
FileSize287540
MD5296E18A9B089BFEFAEF25489CB22FD25
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerYaroslav Halchenko <debian@onerussian.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.6-2
SHA-1A0E32F96A89E86D4994CE9BF224DCA1E281334CC
SHA-256E68BB7AFBD68C53741630C834AB78F093BFC393E88F40B37DC5904F773A371DD
Key Value
FileSize246710
MD5C8A52420FE4F84624C9052D1C5A536F1
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.7-2
SHA-161E92ADB586368933330C293210B31431573E5D4
SHA-256F9DFA8B1A28E43769C09D84C657F69E44F2687648676B3B0DFFB23B929620361
Key Value
FileSize238368
MD539F32E97DC0FF2CB1C1D5D734998CA37
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.5-1
SHA-13A45D72F6B98A1F431D4E47B45E02E4E44A3738D
SHA-25615957088AFF14983E3BA5A24880DC0E3D22F1A76690CCAE6EFC717B6872C22B3