Result for 0F1A2381C036D23BEDC233570BB763231ED9D793

Query result

Key Value
FileName./usr/lib/python3/dist-packages/fail2ban/tests/files/logs/zzz-generic-example
FileSize4009
MD585FB61B264A2299ECB7FDEDE38B9072F
SHA-10F1A2381C036D23BEDC233570BB763231ED9D793
SHA-2565DF6EE0A4D49F274A65F056339A71A3DD6B50B93F2E7B0EDD195EBF214004AB5
SSDEEP96:MKfs9RfpCfr864flrSfAifLWcfJuxRhft7YVOf+1Y4lfB7uR/fF917ycJPR2foAv:4o5mN2Jfa17yQcgKoWBnb
TLSHT163814B350EE303B73468AAF854993B64E714919F4345019CDA4D08AAF54EDF6B3A6FC3
hashlookup:parent-total13
hashlookup:trust100

Network graph view

Parents (Total: 13)

The searched file hash is included in 13 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize329392
MD540EF3A3CA5EE887846A88FE947E0C220
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables/nftables -- default installation uses iptables for banning. nftables is also suported. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.10.2-2
SHA-1629EA6CFF5E20C2686B533BDB1F01D3D6A87BFF5
SHA-256F2B301028038A12E3C7E20579D75D2A75CC01CE836A1771F364EBCEBB3869B13
Key Value
FileSize374672
MD5394CF995FA2DB4F91DAA4F0A52D35660
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, proftpd, sasl, etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables/nftables -- default installation uses iptables for banning. nftables is also supported. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.11.1-1
SHA-15D1F9F26E1A100E0CB042C0E778B608E61ABBF3D
SHA-2563C9D9F501710269F43A6C6EA756ED42D6E45F58790A1588E4DF45898BC9D7CCC
Key Value
MD5D27D3D01378CA08DEBF0198B76A55EB8
PackageArchnoarch
PackageDescriptionThis package contains Fail2Ban's testscases and scripts.
PackageMaintainerFedora Project
PackageNamefail2ban-tests
PackageRelease10.el8
PackageVersion0.11.1
SHA-1D749F0FD12AFEC027421468C32F799A8EE752292
SHA-2564A19F5F0F8C3C8AB9664EF933BD923D5E5BADC7A9637C131CE68489A8E36BCB6
Key Value
MD50CA2973CD226197BBD7D950B8A6F34D8
PackageArchnoarch
PackageDescriptionThis package contains Fail2Ban's testscases and scripts.
PackageMaintainerFedora Project
PackageNamefail2ban-tests
PackageRelease10.fc33
PackageVersion0.11.1
SHA-154FFFB39601B99CA0D0645C37A253E52BCDEF80C
SHA-2565784B6CA647684BB478EE209AF81D7EE5E7864741B61E0EED4359C68E215A11A
Key Value
FileSize384644
MD5D26A26ECA5632E58CDD39C97E1ABEB46
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables/nftables -- default installation uses iptables for banning. nftables is also suported. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerYaroslav Halchenko <debian@onerussian.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.10.2-2.1
SHA-1B36B6A7DACB7E258547368ED435CF1AF33C2984F
SHA-256C7941FFBE271CA12A984F57B2B501B8A5E3BC8248808DB5E23DC6D3F223C114A
Key Value
FileSize329440
MD5B292F1B053101C071324EA3BAE863580
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables/nftables -- default installation uses iptables for banning. nftables is also suported. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.10.2-2.1
SHA-1FCFD7C6D200B5B1E6F6522E74780C4F9AE4FF92D
SHA-25614F21CC23AA52369217D173EF0DA3BBAE61913D5B0791368C52A3B70C0981FEE
Key Value
MD5774F7DDAF109839D79EACE89D64FB949
PackageArchnoarch
PackageDescriptionFail2Ban scans log files like /var/log/secure and bans IP-addresses that have too many password failures within a specified time frame. It updates firewall rules to reject these IP addresses. The rules needed for this can be defined by the user. Fail2Ban can read multiple log files including sshd and Apache web server logs.
PackageMaintainerkekepower <kekepower>
PackageNamefail2ban
PackageRelease2.mga7
PackageVersion0.10.4
SHA-179EA9B329C64BCC28BF78FACFFEFECDA70D4A977
SHA-256C31293D8FB8A38262149A7B94D8F8E71A1F0699748C75D36308A53D7121032D6
Key Value
MD5ED6A64363412AA1F344374C5A3159222
PackageArchnoarch
PackageDescriptionThis package contains Fail2Ban's testscases and scripts.
PackageMaintainerFedora Project
PackageNamefail2ban-tests
PackageRelease4.fc32
PackageVersion0.11.1
SHA-11959F25CD6ABACC29336098F2660774D8D9DD60D
SHA-2562294DB29B188D5A8B7D6BD29646193FE40782C1D26E7D6185937A513D9F729D1
Key Value
MD5F43A01D31A6D4915911CFEB088F4DA59
PackageArchnoarch
PackageDescriptionThis package contains Fail2Ban's testscases and scripts.
PackageMaintainerFedora Project
PackageNamefail2ban-tests
PackageRelease2.el8
PackageVersion0.10.5
SHA-10D8C69015DBB811D71C9C17A7683EF06911A5D44
SHA-256A2C8B3E786255BD589480F9316E034C1A75547CF2F4C66754CE3BC9A69D66FBE
Key Value
MD50AD7F792D0AD19941386BCC0E8AE0E34
PackageArchnoarch
PackageDescriptionThis package contains Fail2Ban's testscases and scripts.
PackageMaintainerFedora Project
PackageNamefail2ban-tests
PackageRelease2.el7
PackageVersion0.10.5
SHA-1420398C9F31FD7363F51D9BA038F1749EFF9EAC6
SHA-256F2F9E2045638704EF122FFF9FCD7A766AB55DDBD4E1AA54F120EB63546FF4339
Key Value
MD51F1F45F4377DB8649F12CE83F98EDC3F
PackageArchnoarch
PackageDescriptionThis package contains Fail2Ban's testscases and scripts.
PackageMaintainerFedora Project
PackageNamefail2ban-tests
PackageRelease10.el7
PackageVersion0.11.1
SHA-184D84011220A9745B9FF08D2C2745218FC630913
SHA-256193E5F6DD786F03FC137F35AF6A1765F1FF0FC2665D795622965784E68A4D3D2
Key Value
FileSize374788
MD5F1C795F478B1DEB107A846A693E74846
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, proftpd, sasl, etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables/nftables -- default installation uses iptables for banning. nftables is also supported. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.11.1-2
SHA-122A3162C7CAD5CD6844522A9328D4C9ABABEDBF9
SHA-2569183DEFD12C02005CE7DB5CE2830DFA1E6D1160D639BCDBDBBFB99DDCAAB8070
Key Value
FileSize385708
MD5C6D10419667B95F6E1CD122178E5B6C4
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables/nftables -- default installation uses iptables for banning. nftables is also suported. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerYaroslav Halchenko <debian@onerussian.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.10.2-2~bpo9+1
SHA-1701288400DBE6748D37F52C4A11B2AC2BE616CD3
SHA-256BF194A3C43450F3E1D01030F97425D04CC806ACFF744BC7BE08B52511C33725E