Result for 033FCDCE936C96B3F6C36FB04CCF82DBB381CF75

Query result

Key Value
FileName./usr/lib/python3/dist-packages/fail2ban/tests/actionstestcase.py
FileSize18725
MD5F385F866D362DD2D4718C1533A60A39F
SHA-1033FCDCE936C96B3F6C36FB04CCF82DBB381CF75
SHA-25669B7C5D504A4AFF0472517DC8A1C3B24C95EE7545A9C11A347801F4AD2606DCA
SSDEEP192:uYPolGOMi+hZw5a28T8n8L8Q8+AlIUOd1A3pGWPxwOo1d3eu0/xjMWPMmHVNrMaS:uYAYsa2aKob860ptHae1/xjc
TLSHT1288233F5736B3F39603303D9600F51179BBACE87026A917099B916392E740EB92F7E54
hashlookup:parent-total6
hashlookup:trust80

Network graph view

Parents (Total: 6)

The searched file hash is included in 6 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize374672
MD5394CF995FA2DB4F91DAA4F0A52D35660
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, proftpd, sasl, etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables/nftables -- default installation uses iptables for banning. nftables is also supported. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.11.1-1
SHA-15D1F9F26E1A100E0CB042C0E778B608E61ABBF3D
SHA-2563C9D9F501710269F43A6C6EA756ED42D6E45F58790A1588E4DF45898BC9D7CCC
Key Value
MD5D27D3D01378CA08DEBF0198B76A55EB8
PackageArchnoarch
PackageDescriptionThis package contains Fail2Ban's testscases and scripts.
PackageMaintainerFedora Project
PackageNamefail2ban-tests
PackageRelease10.el8
PackageVersion0.11.1
SHA-1D749F0FD12AFEC027421468C32F799A8EE752292
SHA-2564A19F5F0F8C3C8AB9664EF933BD923D5E5BADC7A9637C131CE68489A8E36BCB6
Key Value
MD50CA2973CD226197BBD7D950B8A6F34D8
PackageArchnoarch
PackageDescriptionThis package contains Fail2Ban's testscases and scripts.
PackageMaintainerFedora Project
PackageNamefail2ban-tests
PackageRelease10.fc33
PackageVersion0.11.1
SHA-154FFFB39601B99CA0D0645C37A253E52BCDEF80C
SHA-2565784B6CA647684BB478EE209AF81D7EE5E7864741B61E0EED4359C68E215A11A
Key Value
MD5ED6A64363412AA1F344374C5A3159222
PackageArchnoarch
PackageDescriptionThis package contains Fail2Ban's testscases and scripts.
PackageMaintainerFedora Project
PackageNamefail2ban-tests
PackageRelease4.fc32
PackageVersion0.11.1
SHA-11959F25CD6ABACC29336098F2660774D8D9DD60D
SHA-2562294DB29B188D5A8B7D6BD29646193FE40782C1D26E7D6185937A513D9F729D1
Key Value
MD51F1F45F4377DB8649F12CE83F98EDC3F
PackageArchnoarch
PackageDescriptionThis package contains Fail2Ban's testscases and scripts.
PackageMaintainerFedora Project
PackageNamefail2ban-tests
PackageRelease10.el7
PackageVersion0.11.1
SHA-184D84011220A9745B9FF08D2C2745218FC630913
SHA-256193E5F6DD786F03FC137F35AF6A1765F1FF0FC2665D795622965784E68A4D3D2
Key Value
FileSize374788
MD5F1C795F478B1DEB107A846A693E74846
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, proftpd, sasl, etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables/nftables -- default installation uses iptables for banning. nftables is also supported. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.11.1-2
SHA-122A3162C7CAD5CD6844522A9328D4C9ABABEDBF9
SHA-2569183DEFD12C02005CE7DB5CE2830DFA1E6D1160D639BCDBDBBFB99DDCAAB8070