Result for 331D92B6494AE68498DB60B98D0D1A00E69CF709

Query result

Key Value
FileName./etc/fail2ban/action.d/mail-whois-common.conf
FileSize1049
MD5300C15FDC7B9385589932E6FF8D058DE
SHA-1331D92B6494AE68498DB60B98D0D1A00E69CF709
SHA-256CD4CED6A19B8FCB198EDA85B07B4E45EF24B947BEE8B6AD8C650B4E896F792C8
SSDEEP24:EWTCleP5rIU6esMzBIhPd3Gk4arzj9FgAQPnqEbNF8fSke1r+8F:E6CAPFIUrtzGp1karzoGfI1p
TLSHT1FE112583264F575092FF0165B623BB18172523CC2D896B49F9FDA4D13307DCB10B864E
hashlookup:parent-total22
hashlookup:trust100

Network graph view

Parents (Total: 22)

The searched file hash is included in 22 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD5A3C06A02F8F310F6F990ED5F6F721F6A
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions.
PackageMaintainerCBS <cbs@centos.org>
PackageNamefail2ban-mail
PackageRelease3.el7
PackageVersion0.9.5
SHA-10BB0B0A362BCDA166DD6AAFF5073977C65298F25
SHA-25662F6398CB6CD6289FDCCE43E58B1B394AC2222A93061F819E4D241EDFC2E2511
Key Value
MD57612F39ADCBBD96088EF0F6167C18868
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions.
PackageMaintainerFedora Project
PackageNamefail2ban-mail
PackageRelease3.fc24
PackageVersion0.9.3
SHA-121DDA476CBA01800BD7FEAF4B634D931E4A9C79E
SHA-2561D13E6D17E782D955A1DDBD72DF19B3330B4617A75496D1417D79171E58F6E3C
Key Value
MD5C63BBF6119AA09145D83E865CA4EE0F9
PackageArchnoarch
PackageDescriptionFail2ban scans log files like /var/log/messages and bans IP addresses that makes too many password failures. It updates firewall rules to reject the IP address, can send e-mails, or set host.deny entries. These rules can be defined by the user. Fail2Ban can read multiple log files such as sshd or Apache web server ones.
PackageMaintainerhttps://bugs.opensuse.org
PackageNamefail2ban
PackageReleaselp151.1.1
PackageVersion0.10.4
SHA-122C8D2DF4281F69862D943291BB587A6CB25893D
SHA-2566BF6CD98B89F11DDA2F90FCFAC6604648636B41F160C2C242378EF3FD222FBA5
Key Value
FileSize238368
MD539F32E97DC0FF2CB1C1D5D734998CA37
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.5-1
SHA-13A45D72F6B98A1F431D4E47B45E02E4E44A3738D
SHA-25615957088AFF14983E3BA5A24880DC0E3D22F1A76690CCAE6EFC717B6872C22B3
Key Value
MD52139F7C2CBACC4F2E4C783D1D7ED18C3
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions.
PackageMaintainerFedora Project
PackageNamefail2ban-mail
PackageRelease1.fc23
PackageVersion0.9.3
SHA-143CEA0AFF2396BC8A33D503745F5AEB8FBB6A974
SHA-256554EA6BDA2C24C54251264439E009EA45940A182B100407703A52C9869614B15
Key Value
MD5C3F9D0417942EC6CF3938FFC895A8502
PackageArchnoarch
PackageDescriptionFail2ban scans log files like /var/log/messages and bans IP addresses that makes too many password failures. It updates firewall rules to reject the IP address, can send e-mails, or set host.deny entries. These rules can be defined by the user. Fail2Ban can read multiple log files such as sshd or Apache web server ones.
PackageMaintainerhttps://bugs.opensuse.org
PackageNamefail2ban
PackageReleaselp152.2.3
PackageVersion0.10.4
SHA-14EA09D47C62DD200E532FD9AD6E3A72E59715D14
SHA-2569C983F6776B735C8A1CE6D34A7751E67BA35C49AE8EB06599F8432CA905BD339
Key Value
CRC32A384B5E1
FileName19979
FileSize227028
MD5D4EEDCCF04345C9F642391F7ADCECB86
OpSystemCode362
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.3-1
ProductCode184814
RDS:package_id184814
SHA-15036D57B893C077059EDAA930B763BBC5F180F05
SHA-25677956AE0E2809BBBB6E76F7E228A3B453A4A8DD9F005E812BACD708714DDDB8C
SpecialCode
dbnsrl_legacy
insert-timestamp1648751507.4833016
sourceRDS_2022.03.1_legacy.db
Key Value
FileSize246710
MD5C8A52420FE4F84624C9052D1C5A536F1
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.7-2
SHA-161E92ADB586368933330C293210B31431573E5D4
SHA-256F9DFA8B1A28E43769C09D84C657F69E44F2687648676B3B0DFFB23B929620361
Key Value
FileSize329392
MD540EF3A3CA5EE887846A88FE947E0C220
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables/nftables -- default installation uses iptables for banning. nftables is also suported. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.10.2-2
SHA-1629EA6CFF5E20C2686B533BDB1F01D3D6A87BFF5
SHA-256F2B301028038A12E3C7E20579D75D2A75CC01CE836A1771F364EBCEBB3869B13
Key Value
FileSize385708
MD5C6D10419667B95F6E1CD122178E5B6C4
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables/nftables -- default installation uses iptables for banning. nftables is also suported. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerYaroslav Halchenko <debian@onerussian.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.10.2-2~bpo9+1
SHA-1701288400DBE6748D37F52C4A11B2AC2BE616CD3
SHA-256BF194A3C43450F3E1D01030F97425D04CC806ACFF744BC7BE08B52511C33725E