Software: Apache. PHP/8.1.30 uname -a: Linux server1.tuhinhossain.com 5.15.0-151-generic #161-Ubuntu SMP Tue Jul 22 14:25:40 UTC uid=1002(picotech) gid=1003(picotech) groups=1003(picotech),0(root) Safe-mode: OFF (not secure) /etc/fail2ban/action.d/ drwxr-xr-x |
Viewing file: Select action/file-type: # Fail2Ban configuration file # # Author: Michael Gebetsroither # # This is for blocking whole hosts through blackhole routes. # # PRO: # - Works on all kernel versions and as no compatibility problems (back to debian lenny and WAY further). # - It's FAST for very large numbers of blocked ips. # - It's FAST because it Blocks traffic before it enters common iptables chains used for filtering. # - It's per host, ideal as action against ssh password bruteforcing to block further attack attempts. # - No additional software required beside iproute/iproute2 # # CON: # - Blocking is per IP and NOT per service, but ideal as action against ssh password bruteforcing hosts [Definition] actionban = ip route add <blocktype> <ip> actionunban = ip route del <blocktype> <ip> actioncheck = actionstart = actionstop = [Init] # Option: blocktype # Note: Type can be blackhole, unreachable and prohibit. Unreachable and prohibit correspond to the ICMP reject messages. # Values: STRING blocktype = unreachable |
:: Command execute :: | |
--[ c99shell v. 2.5 [PHP 8 Update] [24.05.2025] | Generation time: 0.0036 ]-- |