Result for CEC19CCA46875DC5894E5DB828EA20F3DC1E3B93

Query result

Key Value
FileName./etc/fail2ban/action.d/mail-whois-lines.conf
FileSize2043
MD5825F81FC6CD2DC951EADCCBCC4043AF9
SHA-1CEC19CCA46875DC5894E5DB828EA20F3DC1E3B93
SHA-25656FA24EA2DFBAF4E98A9C3FAD86AAFB9CAE78912D01DD063E82CC31FEAEEE59E
SSDEEP48:E6iO7YXICeMo+/sUCbAQYkCtq25OMfuTjxmc6bo7x:N7KPVAqlwGGXt
TLSHT1EA412F4B37AC67B021CA01A0A55F72A08727B129E3233970F7ACE52473910F5B6F79C9
hashlookup:parent-total14
hashlookup:trust100

Network graph view

Parents (Total: 14)

The searched file hash is included in 14 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD57612F39ADCBBD96088EF0F6167C18868
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions.
PackageMaintainerFedora Project
PackageNamefail2ban-mail
PackageRelease3.fc24
PackageVersion0.9.3
SHA-121DDA476CBA01800BD7FEAF4B634D931E4A9C79E
SHA-2561D13E6D17E782D955A1DDBD72DF19B3330B4617A75496D1417D79171E58F6E3C
Key Value
MD58C7381A82C5F83F2C3A7F1A2A115B16E
PackageArchnoarch
PackageDescriptionFail2ban scans log files like /var/log/pwdfail or /var/log/apache/error_log and bans IP that makes too many password failures. It updates firewall rules to reject the IP address. To use the hostsdeny and shorewall actions you must install tcp_wrappers and shorewall respectively.
PackageMaintainerFedora Project
PackageNamefail2ban
PackageRelease1.el6.1
PackageVersion0.9.6
SHA-182976B33BE986F928F3B895B3CE9CEEA59773356
SHA-2565494D678669606897C1CFB851921A8833797F6F697822AA68A1ACA03FA7D942B
Key Value
MD5400760C55E6AD76DE6D9ED8063B9005E
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions.
PackageMaintainerCBS <cbs@centos.org>
PackageNamefail2ban-mail
PackageRelease1.el7
PackageVersion0.9.7
SHA-1E5661F089F525E367BA76E0DEBC8C606A1717256
SHA-25655C75EA491BE449904F52B85B20403026CF0FEB9EE788A1BEB6B3CFE4759B86E
Key Value
MD5A3C06A02F8F310F6F990ED5F6F721F6A
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions.
PackageMaintainerCBS <cbs@centos.org>
PackageNamefail2ban-mail
PackageRelease3.el7
PackageVersion0.9.5
SHA-10BB0B0A362BCDA166DD6AAFF5073977C65298F25
SHA-25662F6398CB6CD6289FDCCE43E58B1B394AC2222A93061F819E4D241EDFC2E2511
Key Value
FileSize244164
MD55C635C14D4404EF2EF4C943EDA15ED16
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.6-1
SHA-1F64D159FE5506D5931EBC5F2BBC1D9D621CCE895
SHA-2566F30F9E522BEE2D7724FBC32F7704FCB97252915B04AB796D69C3FE7E2AFE36D
Key Value
CRC32A384B5E1
FileName19979
FileSize227028
MD5D4EEDCCF04345C9F642391F7ADCECB86
OpSystemCode362
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.3-1
ProductCode184814
RDS:package_id184814
SHA-15036D57B893C077059EDAA930B763BBC5F180F05
SHA-25677956AE0E2809BBBB6E76F7E228A3B453A4A8DD9F005E812BACD708714DDDB8C
SpecialCode
dbnsrl_legacy
insert-timestamp1648751507.4833016
sourceRDS_2022.03.1_legacy.db
Key Value
MD509452EC2B46BA70E9002DB75FD05A803
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions.
PackageMaintainerFedora Project
PackageNamefail2ban-mail
PackageRelease1.fc23
PackageVersion0.9.3
SHA-174072EF3DA8E654040A05486EF8642BB53D0D702
SHA-25611A6661CA982CE5A5B400C54DF2A528F9F288585E44A4877A6598D124A27A24B
Key Value
MD5B1200E7D908C9A692E8B477EFCB3AED8
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions.
PackageMaintainerFedora Project
PackageNamefail2ban-mail
PackageRelease1.el7
PackageVersion0.9.7
SHA-17C46CF0C559E6A92BAD0B0ADAEC2F4F1FCA7FA7F
SHA-2566B0DE90FCE14CDBFBA35DAFF72CD1622E77E06D44695052E04A68EEE0DEB9612
Key Value
MD510ED7EE4740A6AE2E11ADF0949DAB2C4
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions.
PackageMaintainerFedora Project
PackageNamefail2ban-mail
PackageRelease1.fc23
PackageVersion0.9.3
SHA-1A7BC6B56740E0F07F9DA591AEA4338EE58E179C0
SHA-25637A2E22C5AC64944BDE46EE8A93469A1D9B5213F803F96DF500514E02C017085
Key Value
MD52139F7C2CBACC4F2E4C783D1D7ED18C3
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions.
PackageMaintainerFedora Project
PackageNamefail2ban-mail
PackageRelease1.fc23
PackageVersion0.9.3
SHA-143CEA0AFF2396BC8A33D503745F5AEB8FBB6A974
SHA-256554EA6BDA2C24C54251264439E009EA45940A182B100407703A52C9869614B15
Key Value
FileSize287540
MD5296E18A9B089BFEFAEF25489CB22FD25
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerYaroslav Halchenko <debian@onerussian.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.6-2
SHA-1A0E32F96A89E86D4994CE9BF224DCA1E281334CC
SHA-256E68BB7AFBD68C53741630C834AB78F093BFC393E88F40B37DC5904F773A371DD
Key Value
MD5F5237F424AF869732B0B965C4D9952EE
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's mail actions. These are an alternative to the default sendmail actions.
PackageMaintainerFedora Project
PackageNamefail2ban-mail
PackageRelease3.fc24
PackageVersion0.9.3
SHA-1AE5F74C3B7A2CB934366C058CE729DA739E20794
SHA-256AB875ED28FE46F80836BA9F579D1566C245F01C00839F29B46EA18BF923A6226
Key Value
FileSize246710
MD5C8A52420FE4F84624C9052D1C5A536F1
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.7-2
SHA-161E92ADB586368933330C293210B31431573E5D4
SHA-256F9DFA8B1A28E43769C09D84C657F69E44F2687648676B3B0DFFB23B929620361
Key Value
FileSize238368
MD539F32E97DC0FF2CB1C1D5D734998CA37
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.5-1
SHA-13A45D72F6B98A1F431D4E47B45E02E4E44A3738D
SHA-25615957088AFF14983E3BA5A24880DC0E3D22F1A76690CCAE6EFC717B6872C22B3