Result for 0AD0FB84D9D0DB6EF36F93968B34CFFB5CE45EAB

Query result

Key Value
FileName./etc/logrotate.d/psad
FileSize515
MD513E009156C9381BA19E6BBD62374C712
SHA-10AD0FB84D9D0DB6EF36F93968B34CFFB5CE45EAB
SHA-25648125C7DA4C99E3D5FFCFA42922C4478A8B8997C1AB7232FE523CCDFB532476B
SSDEEP6:YOeDIqpxcF39pCFWLB2JMi9eF1QZ6hQcdG0/R2FFWFdLwl:YjBxZFqBsENhPXo/mLwl
TLSHT1C4F0AB0C155CBD322883D2C6522E4AC9A13814006B6908423B9EB6E96F2FE7057E4E68
hashlookup:parent-total65
hashlookup:trust100

Network graph view

Parents (Total: 65)

The searched file hash is included in 65 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD545A4B8325F05AE181F666CA24505AAAB
PackageArchs390
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (http://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (http://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerFedora Project
PackageNamepsad
PackageRelease6.fc23
PackageVersion2.2.1
SHA-102A293B93629DB38403B1AAB5CA13ED619FD8702
SHA-2567034157F3D1C0231E7013D56E19D7C256BD775E07B43E266B4E2A021A6009F1E
Key Value
MD5F2DA0E368E40EF227EFE394699E1B043
PackageArchppc
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (http://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (http://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerKoji
PackageNamepsad
PackageRelease2.fc15
PackageVersion2.1.7
SHA-10CFC20A38DA9F3F64FC03314BE6F5E22DC2DB386
SHA-2568ACF914ED95B4802E498A9B0331EBE03F6762EF5E8CC9A3CD6B81687F0D5A01C
Key Value
MD5B961A7BF829A6E6FBD893ABF7143FFBD
PackageArchppc64le
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (https://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (https://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerFedora Project
PackageNamepsad
PackageRelease4.el7
PackageVersion2.4.3
SHA-10DEACDAC8A6824BFF3795AB4814B64CB09403595
SHA-256BEAAA126F0F5870CBB2B0DAA2D205DB8F82F08A41B24B568F32BE64AE638285D
Key Value
MD518430002C705C25EEA451073ADE21BB4
PackageArchs390
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (http://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (http://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerFedora Project
PackageNamepsad
PackageRelease5.fc17
PackageVersion2.1.7
SHA-112867A84310B006EE7CC9674A2B412BD3F26AD6B
SHA-256B8AE9999FC76E3C42A4B5A889A96B564C2EDF23A211CD4D78D4E655E6171CA92
Key Value
MD554CDD21BBC84A4CABDA331435819E632
PackageArchppc64le
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (http://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (http://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerFedora Project
PackageNamepsad
PackageRelease5.fc21
PackageVersion2.2.1
SHA-115E0E9D19EC24DC5301DBA46D2FA43409350A3F7
SHA-2568D68AD1072D8421F7CA2222622A2CF83AE6CC998F34D26EE7167D43783D0DF6B
Key Value
MD55F75F201039630C406C4A5D6D355C74A
PackageArchppc
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (http://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (http://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerFedora Project
PackageNamepsad
PackageRelease3.fc20
PackageVersion2.2.1
SHA-1167A8DC3C129BF067177F754435ED290AE8D6BA1
SHA-25641C8A868A07025203F1532FAB9D9F4202CB6E1F72A20069850480820FCE0CE13
Key Value
MD5210F4B4EFEA0A524B8BBFABFC615FD58
PackageArchnoarch
PackageDescriptionPort Scan Attack Detector (psad) is a lightweight system daemon written in Perl designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (https://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (https://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerFedora Project
PackageNamepsad
PackageRelease8.fc34
PackageVersion2.4.6
SHA-117783DF975B2FA4FE7460AE895D7B9543EFC1411
SHA-256C341E172679D357503FED7356F6FA03AC9DE0689751CC4DE0BCE96DB666E3302
Key Value
MD56EFF36B5A6FF7A8E05697307E86432D2
PackageArchppc64le
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (http://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (http://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerFedora Project
PackageNamepsad
PackageRelease5.fc22
PackageVersion2.2.1
SHA-11F74582E73BB1BD1D2BE455C4872AA905D9E11CD
SHA-2568DB880856A71A0D7A9CF24CD58AA03FB0803D663CC91B9AEF794968ECCBEE7DC
Key Value
MD5D488E2CC5E071351AEAC2929CF7B156B
PackageArchppc
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (http://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (http://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerKoji
PackageNamepsad
PackageRelease6.fc18
PackageVersion2.1.7
SHA-125EF47A3EECE47241A3880C2A01152947BB64911
SHA-256EEBEF75F0B62FA39A7DDC55B94C100E0D3A7D812F9B3D9C7E53BBF2A8FFB521E
Key Value
MD5316B4C7010A6B655EC7836A125010E3E
PackageArchppc64
PackageDescriptionPort Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and in C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, tcp flags and corresponding nmap options, reverse DNS info, email and syslog alerting, automatic blocking of offending ip addresses via dynamic configuration of iptables rulesets, and passive operating system fingerprinting. In addition, psad incorporates many of the tcp, udp, and icmp signatures included in the snort intrusion detection system (http://www.snort.org) to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, xmas) which are easily leveraged against a machine via nmap. psad can also alert on snort signatures that are logged via fwsnort (http://www.cipherdyne.org/fwsnort/), which makes use of the iptables string match module to detect application layer signatures.
PackageMaintainerFedora Project
PackageNamepsad
PackageRelease7.fc24
PackageVersion2.2.1
SHA-12780FCEEBBD45396CB6FCBC66F3F851B795AAD5F
SHA-256AF3A1EF9CD7EA356C17343782A0773658C620A24DFDC6CAC041A01ACCDA00F83