Result for 0C2125BEF34D48D785FD865CB0E03B9FC082B9CB

Query result

Key Value
FileName./usr/lib/python2.7/site-packages/fail2ban/tests/actiontestcase.py
FileSize12727
MD5279C3D70A2D3BD938455F001E61FA4B0
SHA-10C2125BEF34D48D785FD865CB0E03B9FC082B9CB
SHA-256793637AF815E454D1CD8D58DF7EFDE867D042ACECA2122AD0441BE968FD9FA0D
SSDEEP192:uYN20P58oavAMoqMuCrP8SZh9dq19/buVp+lL+816lSPhv1SFeDDcxH+fZeZR4bp:uYDP58oavAMCukzdKDuKD6lXK892THBT
TLSHT1D34255F5F29D3DBAA07736BC144E029E677C0EA3C10D6205BC39942A7D7809BA577C98
hashlookup:parent-total8
hashlookup:trust90

Network graph view

Parents (Total: 8)

The searched file hash is included in 8 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD58C7381A82C5F83F2C3A7F1A2A115B16E
PackageArchnoarch
PackageDescriptionFail2ban scans log files like /var/log/pwdfail or /var/log/apache/error_log and bans IP that makes too many password failures. It updates firewall rules to reject the IP address. To use the hostsdeny and shorewall actions you must install tcp_wrappers and shorewall respectively.
PackageMaintainerFedora Project
PackageNamefail2ban
PackageRelease1.el6.1
PackageVersion0.9.6
SHA-182976B33BE986F928F3B895B3CE9CEEA59773356
SHA-2565494D678669606897C1CFB851921A8833797F6F697822AA68A1ACA03FA7D942B
Key Value
FileSize244164
MD55C635C14D4404EF2EF4C943EDA15ED16
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.6-1
SHA-1F64D159FE5506D5931EBC5F2BBC1D9D621CCE895
SHA-2566F30F9E522BEE2D7724FBC32F7704FCB97252915B04AB796D69C3FE7E2AFE36D
Key Value
MD542B1CE9BFAF435DC41F10491AF42F249
PackageArchnoarch
PackageDescriptionThis package contains the core server components for Fail2Ban with minimal dependencies. You can install this directly if you want to have a small installation and know what you are doing.
PackageMaintainerCBS <cbs@centos.org>
PackageNamefail2ban-server
PackageRelease3.el7
PackageVersion0.9.5
SHA-10E41B59481336E90526E2648C69483457532D463
SHA-256BC1FAB396B540610A903ED11092336280BDA58AB7CEE060678226406CAE162AC
Key Value
MD58FFCD5A974962287246222E5B1875FC0
PackageArchnoarch
PackageDescriptionThis package contains Fail2Ban's testscases and scripts.
PackageMaintainerFedora Project
PackageNamefail2ban-tests
PackageRelease1.el7
PackageVersion0.9.7
SHA-17F3D195A225D766A61B5EE1C8B84039535AC15A8
SHA-2564636F2DE7C6197C2C464AC2140178320C9D0F01F78FAC8AB555D40EDB1B502D2
Key Value
MD5D6D6DA5FF139A273B4B21D5BFDE04280
PackageArchnoarch
PackageDescriptionThis package contains Fail2Ban's testscases and scripts.
PackageMaintainerCBS <cbs@centos.org>
PackageNamefail2ban-tests
PackageRelease1.el7
PackageVersion0.9.7
SHA-1B9BFAC308098A08B13EA98E22F64F68B47DD4193
SHA-256620ADD445F5DCD85899966C3396FE9D36AD6AC5DD778B489DF90A59911739CFC
Key Value
FileSize287540
MD5296E18A9B089BFEFAEF25489CB22FD25
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerYaroslav Halchenko <debian@onerussian.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.6-2
SHA-1A0E32F96A89E86D4994CE9BF224DCA1E281334CC
SHA-256E68BB7AFBD68C53741630C834AB78F093BFC393E88F40B37DC5904F773A371DD
Key Value
FileSize246710
MD5C8A52420FE4F84624C9052D1C5A536F1
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.7-2
SHA-161E92ADB586368933330C293210B31431573E5D4
SHA-256F9DFA8B1A28E43769C09D84C657F69E44F2687648676B3B0DFFB23B929620361
Key Value
FileSize238368
MD539F32E97DC0FF2CB1C1D5D734998CA37
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.5-1
SHA-13A45D72F6B98A1F431D4E47B45E02E4E44A3738D
SHA-25615957088AFF14983E3BA5A24880DC0E3D22F1A76690CCAE6EFC717B6872C22B3