Key | Value |
---|---|
FileName | ./etc/fail2ban/action.d/mail-whois-lines.conf |
FileSize | 2043 |
MD5 | 825F81FC6CD2DC951EADCCBCC4043AF9 |
SHA-1 | CEC19CCA46875DC5894E5DB828EA20F3DC1E3B93 |
SHA-256 | 56FA24EA2DFBAF4E98A9C3FAD86AAFB9CAE78912D01DD063E82CC31FEAEEE59E |
SSDEEP | 48:E6iO7YXICeMo+/sUCbAQYkCtq25OMfuTjxmc6bo7x:N7KPVAqlwGGXt |
TLSH | T1EA412F4B37AC67B021CA01A0A55F72A08727B129E3233970F7ACE52473910F5B6F79C9 |
hashlookup:parent-total | 14 |
hashlookup:trust | 100 |
The searched file hash is included in 14 parent files which include package known and seen by metalookup. A sample is included below:
Key | Value |
---|---|
MD5 | 7612F39ADCBBD96088EF0F6167C18868 |
PackageArch | noarch |
PackageDescription | This package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions. |
PackageMaintainer | Fedora Project |
PackageName | fail2ban-mail |
PackageRelease | 3.fc24 |
PackageVersion | 0.9.3 |
SHA-1 | 21DDA476CBA01800BD7FEAF4B634D931E4A9C79E |
SHA-256 | 1D13E6D17E782D955A1DDBD72DF19B3330B4617A75496D1417D79171E58F6E3C |
Key | Value |
---|---|
MD5 | 8C7381A82C5F83F2C3A7F1A2A115B16E |
PackageArch | noarch |
PackageDescription | Fail2ban scans log files like /var/log/pwdfail or /var/log/apache/error_log and bans IP that makes too many password failures. It updates firewall rules to reject the IP address. To use the hostsdeny and shorewall actions you must install tcp_wrappers and shorewall respectively. |
PackageMaintainer | Fedora Project |
PackageName | fail2ban |
PackageRelease | 1.el6.1 |
PackageVersion | 0.9.6 |
SHA-1 | 82976B33BE986F928F3B895B3CE9CEEA59773356 |
SHA-256 | 5494D678669606897C1CFB851921A8833797F6F697822AA68A1ACA03FA7D942B |
Key | Value |
---|---|
MD5 | 400760C55E6AD76DE6D9ED8063B9005E |
PackageArch | noarch |
PackageDescription | This package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions. |
PackageMaintainer | CBS <cbs@centos.org> |
PackageName | fail2ban-mail |
PackageRelease | 1.el7 |
PackageVersion | 0.9.7 |
SHA-1 | E5661F089F525E367BA76E0DEBC8C606A1717256 |
SHA-256 | 55C75EA491BE449904F52B85B20403026CF0FEB9EE788A1BEB6B3CFE4759B86E |
Key | Value |
---|---|
MD5 | A3C06A02F8F310F6F990ED5F6F721F6A |
PackageArch | noarch |
PackageDescription | This package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions. |
PackageMaintainer | CBS <cbs@centos.org> |
PackageName | fail2ban-mail |
PackageRelease | 3.el7 |
PackageVersion | 0.9.5 |
SHA-1 | 0BB0B0A362BCDA166DD6AAFF5073977C65298F25 |
SHA-256 | 62F6398CB6CD6289FDCCE43E58B1B394AC2222A93061F819E4D241EDFC2E2511 |
Key | Value |
---|---|
FileSize | 244164 |
MD5 | 5C635C14D4404EF2EF4C943EDA15ED16 |
PackageDescription | ban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes |
PackageMaintainer | Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
PackageName | fail2ban |
PackageSection | net |
PackageVersion | 0.9.6-1 |
SHA-1 | F64D159FE5506D5931EBC5F2BBC1D9D621CCE895 |
SHA-256 | 6F30F9E522BEE2D7724FBC32F7704FCB97252915B04AB796D69C3FE7E2AFE36D |
Key | Value |
---|---|
CRC32 | A384B5E1 |
FileName | 19979 |
FileSize | 227028 |
MD5 | D4EEDCCF04345C9F642391F7ADCECB86 |
OpSystemCode | 362 |
PackageDescription | ban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes |
PackageMaintainer | Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
PackageName | fail2ban |
PackageSection | net |
PackageVersion | 0.9.3-1 |
ProductCode | 184814 |
RDS:package_id | 184814 |
SHA-1 | 5036D57B893C077059EDAA930B763BBC5F180F05 |
SHA-256 | 77956AE0E2809BBBB6E76F7E228A3B453A4A8DD9F005E812BACD708714DDDB8C |
SpecialCode | |
db | nsrl_legacy |
insert-timestamp | 1648751507.4833016 |
source | RDS_2022.03.1_legacy.db |
Key | Value |
---|---|
MD5 | 09452EC2B46BA70E9002DB75FD05A803 |
PackageArch | noarch |
PackageDescription | This package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions. |
PackageMaintainer | Fedora Project |
PackageName | fail2ban-mail |
PackageRelease | 1.fc23 |
PackageVersion | 0.9.3 |
SHA-1 | 74072EF3DA8E654040A05486EF8642BB53D0D702 |
SHA-256 | 11A6661CA982CE5A5B400C54DF2A528F9F288585E44A4877A6598D124A27A24B |
Key | Value |
---|---|
MD5 | B1200E7D908C9A692E8B477EFCB3AED8 |
PackageArch | noarch |
PackageDescription | This package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions. |
PackageMaintainer | Fedora Project |
PackageName | fail2ban-mail |
PackageRelease | 1.el7 |
PackageVersion | 0.9.7 |
SHA-1 | 7C46CF0C559E6A92BAD0B0ADAEC2F4F1FCA7FA7F |
SHA-256 | 6B0DE90FCE14CDBFBA35DAFF72CD1622E77E06D44695052E04A68EEE0DEB9612 |
Key | Value |
---|---|
MD5 | 10ED7EE4740A6AE2E11ADF0949DAB2C4 |
PackageArch | noarch |
PackageDescription | This package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions. |
PackageMaintainer | Fedora Project |
PackageName | fail2ban-mail |
PackageRelease | 1.fc23 |
PackageVersion | 0.9.3 |
SHA-1 | A7BC6B56740E0F07F9DA591AEA4338EE58E179C0 |
SHA-256 | 37A2E22C5AC64944BDE46EE8A93469A1D9B5213F803F96DF500514E02C017085 |
Key | Value |
---|---|
MD5 | 2139F7C2CBACC4F2E4C783D1D7ED18C3 |
PackageArch | noarch |
PackageDescription | This package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions. |
PackageMaintainer | Fedora Project |
PackageName | fail2ban-mail |
PackageRelease | 1.fc23 |
PackageVersion | 0.9.3 |
SHA-1 | 43CEA0AFF2396BC8A33D503745F5AEB8FBB6A974 |
SHA-256 | 554EA6BDA2C24C54251264439E009EA45940A182B100407703A52C9869614B15 |
Key | Value |
---|---|
FileSize | 287540 |
MD5 | 296E18A9B089BFEFAEF25489CB22FD25 |
PackageDescription | ban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes |
PackageMaintainer | Yaroslav Halchenko <debian@onerussian.com> |
PackageName | fail2ban |
PackageSection | net |
PackageVersion | 0.9.6-2 |
SHA-1 | A0E32F96A89E86D4994CE9BF224DCA1E281334CC |
SHA-256 | E68BB7AFBD68C53741630C834AB78F093BFC393E88F40B37DC5904F773A371DD |
Key | Value |
---|---|
MD5 | F5237F424AF869732B0B965C4D9952EE |
PackageArch | noarch |
PackageDescription | This package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions. |
PackageMaintainer | Fedora Project |
PackageName | fail2ban-mail |
PackageRelease | 3.fc24 |
PackageVersion | 0.9.3 |
SHA-1 | AE5F74C3B7A2CB934366C058CE729DA739E20794 |
SHA-256 | AB875ED28FE46F80836BA9F579D1566C245F01C00839F29B46EA18BF923A6226 |
Key | Value |
---|---|
FileSize | 246710 |
MD5 | C8A52420FE4F84624C9052D1C5A536F1 |
PackageDescription | ban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes |
PackageMaintainer | Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
PackageName | fail2ban |
PackageSection | net |
PackageVersion | 0.9.7-2 |
SHA-1 | 61E92ADB586368933330C293210B31431573E5D4 |
SHA-256 | F9DFA8B1A28E43769C09D84C657F69E44F2687648676B3B0DFFB23B929620361 |
Key | Value |
---|---|
FileSize | 238368 |
MD5 | 39F32E97DC0FF2CB1C1D5D734998CA37 |
PackageDescription | ban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes |
PackageMaintainer | Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
PackageName | fail2ban |
PackageSection | net |
PackageVersion | 0.9.5-1 |
SHA-1 | 3A45D72F6B98A1F431D4E47B45E02E4E44A3738D |
SHA-256 | 15957088AFF14983E3BA5A24880DC0E3D22F1A76690CCAE6EFC717B6872C22B3 |