Result for 071C86BCF8E57F846844489C694D274CBE0C7302

Query result

Key Value
FileName./etc/fail2ban/filter.d/murmur.conf
FileSize652
MD510D35FFA4CA8CABB7DD9B09C81A3BA7E
SHA-1071C86BCF8E57F846844489C694D274CBE0C7302
SHA-2567F02A4DFC7F1DC80FA4512496F492E29A7476DC45D09ADB0DED5FF99E505ADB8
SSDEEP12:E1ewpVIWQcYUQ+4PxO6u8TC9HUcuWV0tB4HOMAw4GRAuSf0YZvYleQrU:E1ewpVIWsPo6VKqWVW2ONrGm/0Uj
TLSHT186F0D37767D43919055641A8219E118CE79EE0AE14CA0805323D730E3738F6C906BF97
hashlookup:parent-total8
hashlookup:trust90

Network graph view

Parents (Total: 8)

The searched file hash is included in 8 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD58C7381A82C5F83F2C3A7F1A2A115B16E
PackageArchnoarch
PackageDescriptionFail2ban scans log files like /var/log/pwdfail or /var/log/apache/error_log and bans IP that makes too many password failures. It updates firewall rules to reject the IP address. To use the hostsdeny and shorewall actions you must install tcp_wrappers and shorewall respectively.
PackageMaintainerFedora Project
PackageNamefail2ban
PackageRelease1.el6.1
PackageVersion0.9.6
SHA-182976B33BE986F928F3B895B3CE9CEEA59773356
SHA-2565494D678669606897C1CFB851921A8833797F6F697822AA68A1ACA03FA7D942B
Key Value
FileSize244164
MD55C635C14D4404EF2EF4C943EDA15ED16
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.6-1
SHA-1F64D159FE5506D5931EBC5F2BBC1D9D621CCE895
SHA-2566F30F9E522BEE2D7724FBC32F7704FCB97252915B04AB796D69C3FE7E2AFE36D
Key Value
MD542B1CE9BFAF435DC41F10491AF42F249
PackageArchnoarch
PackageDescriptionThis package contains the core server components for Fail2Ban with minimal dependencies. You can install this directly if you want to have a small installation and know what you are doing.
PackageMaintainerCBS <cbs@centos.org>
PackageNamefail2ban-server
PackageRelease3.el7
PackageVersion0.9.5
SHA-10E41B59481336E90526E2648C69483457532D463
SHA-256BC1FAB396B540610A903ED11092336280BDA58AB7CEE060678226406CAE162AC
Key Value
MD57DEB4D97509EF595A3B2AE8B2DADD33E
PackageArchnoarch
PackageDescriptionThis package contains the core server components for Fail2Ban with minimal dependencies. You can install this directly if you want to have a small installation and know what you are doing.
PackageMaintainerFedora Project
PackageNamefail2ban-server
PackageRelease1.el7
PackageVersion0.9.7
SHA-17AEDC73283CB2965D4AD88919143553E38A69FE9
SHA-256FF460F1595C970B55F4249CC0CA22BE14604B968EAA1E5D790F364FD9B820674
Key Value
MD523598ACABD0BF151FE8AA55FE98406DA
PackageArchnoarch
PackageDescriptionThis package contains the core server components for Fail2Ban with minimal dependencies. You can install this directly if you want to have a small installation and know what you are doing.
PackageMaintainerCBS <cbs@centos.org>
PackageNamefail2ban-server
PackageRelease1.el7
PackageVersion0.9.7
SHA-110BEF8241FF556BB03B6EEA32B91988824871A82
SHA-2565ED3325C027F979D43E761D5DBE26A4FB001E4AB2C542560553F22DE5BBD0E25
Key Value
FileSize287540
MD5296E18A9B089BFEFAEF25489CB22FD25
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerYaroslav Halchenko <debian@onerussian.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.6-2
SHA-1A0E32F96A89E86D4994CE9BF224DCA1E281334CC
SHA-256E68BB7AFBD68C53741630C834AB78F093BFC393E88F40B37DC5904F773A371DD
Key Value
FileSize246710
MD5C8A52420FE4F84624C9052D1C5A536F1
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.7-2
SHA-161E92ADB586368933330C293210B31431573E5D4
SHA-256F9DFA8B1A28E43769C09D84C657F69E44F2687648676B3B0DFFB23B929620361
Key Value
FileSize238368
MD539F32E97DC0FF2CB1C1D5D734998CA37
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.5-1
SHA-13A45D72F6B98A1F431D4E47B45E02E4E44A3738D
SHA-25615957088AFF14983E3BA5A24880DC0E3D22F1A76690CCAE6EFC717B6872C22B3