Result for 05C7976B8C62E5B2D3EC138D577E7EC05633556F

Query result

Key Value
FileName./usr/bin/nf2csv
FileSize19026
MD548C29330F2387850436009E37CB66099
SHA-105C7976B8C62E5B2D3EC138D577E7EC05633556F
SHA-256A40C392F9BEA105393E6D624EA89C1D8FECEE7FF8F82B1BB770014D3F8512FDF
SSDEEP192:m3hmfXzMdYT7A+d/cfwhKga9OPWfs3shC3iApOgx4/LJ50tEMyXQtnVViJNHSzUl:9fXwdYT7ndJLoA7VatFx
TLSHT1D38272DA49D3A2D88A92E4D957DD905066AAC07738DBBC18BD3FC2D80F41538D3B23E5
hashlookup:parent-total25
hashlookup:trust100

Network graph view

Parents (Total: 25)

The searched file hash is included in 25 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD5F2DA0E368E40EF227EFE394699E1B043
PackageArchppc
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (http://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (http://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerKoji
PackageNamepsad
PackageRelease2.fc15
PackageVersion2.1.7
SHA-10CFC20A38DA9F3F64FC03314BE6F5E22DC2DB386
SHA-2568ACF914ED95B4802E498A9B0331EBE03F6762EF5E8CC9A3CD6B81687F0D5A01C
Key Value
MD518430002C705C25EEA451073ADE21BB4
PackageArchs390
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (http://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (http://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerFedora Project
PackageNamepsad
PackageRelease5.fc17
PackageVersion2.1.7
SHA-112867A84310B006EE7CC9674A2B412BD3F26AD6B
SHA-256B8AE9999FC76E3C42A4B5A889A96B564C2EDF23A211CD4D78D4E655E6171CA92
Key Value
MD5D488E2CC5E071351AEAC2929CF7B156B
PackageArchppc
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (http://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (http://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerKoji
PackageNamepsad
PackageRelease6.fc18
PackageVersion2.1.7
SHA-125EF47A3EECE47241A3880C2A01152947BB64911
SHA-256EEBEF75F0B62FA39A7DDC55B94C100E0D3A7D812F9B3D9C7E53BBF2A8FFB521E
Key Value
MD513118A1FE978C631E881333F30B77304
PackageArchs390
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (http://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (http://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerFedora Project
PackageNamepsad
PackageRelease2.fc15
PackageVersion2.1.7
SHA-12D1EBEE7DC05861F58A9606D567EFA1B18BC81C2
SHA-256FA1572CEB24188CD4FD2AB5214E0ADB895BADC06999647EA4E802578D2927D0A
Key Value
MD54C4ED42FA206DC1FFBBE52EC6B404679
PackageArchs390x
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (http://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (http://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerFedora Project
PackageNamepsad
PackageRelease2.fc15
PackageVersion2.1.7
SHA-1442CDF534C4CCC8BE44FEB949389747E3DB7043B
SHA-256632038840AEE80DD911AA660D4D2E5A57F8AA91423A41793443F7A162FAEDF26
Key Value
MD583542915AE981B866B064C25E1D640DE
PackageArcharmv5tel
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (http://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (http://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerFedora Project
PackageNamepsad
PackageRelease1.fc13
PackageVersion2.1.7
SHA-14432B6BE6B517C61250A9B880CAEEC4DA397C085
SHA-25629E4D6C1BCF4FBD1AF9F3B5C6553F3089FAB2F63BAE1B1D9231808135E83490A
Key Value
MD5AE87935A13410548BF209925676C01FD
PackageArcharmv5tel
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (http://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (http://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerFedora Project
PackageNamepsad
PackageRelease5.fc17
PackageVersion2.1.7
SHA-155978E5BFF456CCD56FDBF934A591FA640558F0E
SHA-256B5AA78931F79A11D5FA329650508855C9E9F6FF95CE440DCE4C7C1C9591AECC8
Key Value
MD5764C644C2EA056961B8FF2760B77292C
PackageArchppc64
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (http://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (http://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerKoji
PackageNamepsad
PackageRelease6.fc18
PackageVersion2.1.7
SHA-1646A7F5B5DF0214FFA58365E635731E02F203598
SHA-2562B03D4CA73B546E3A22CEBA97620566E857C3FE6D9782544E0E7F203ED5C39B0
Key Value
MD52D0E144C9A65BA3A3BA9F652C10A2EBA
PackageArchppc
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (http://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (http://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerKoji
PackageNamepsad
PackageRelease5.fc17
PackageVersion2.1.7
SHA-16C46FC400423ED47278979149443D5F31D9B3ADC
SHA-25600196B8AF0427E25A3FC9EA3CF2EBC9219B0846E094EAF6C82B9804295301651
Key Value
MD5402B4A8541C141D2DE40EB1E596BB25D
PackageArchs390x
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (http://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (http://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerFedora Project
PackageNamepsad
PackageRelease6.fc18
PackageVersion2.1.7
SHA-16D67B371D07B545BB3D160858A22150713436899
SHA-2565EC9242C1B1787CC80E0FD996B67D3179D03562D40060F1F5B55762EF905B1B2