Welcome To Our Shell

Mister Spy & Souheyl Bypass Shell

Current Path : /etc/fail2ban/filter.d/

Linux ift1.ift-informatik.de 5.4.0-216-generic #236-Ubuntu SMP Fri Apr 11 19:53:21 UTC 2025 x86_64
Upload File :
Current File : //etc/fail2ban/filter.d/nsd.conf

# Fail2Ban configuration file
#
# Author: Bas van den Dikkenberg
#
#

[INCLUDES]

# Read common prefixes. If any customizations available -- read them from
# common.local
before = common.conf


[Definition]

_daemon = nsd

# Option:  failregex
# Notes.:  regex to match the password failures messages in the logfile. The
#          host must be matched by a group named "host". The tag "<HOST>" can
#          be used for standard IP/hostname matching and is only an alias for
#          (?:::f{4,6}:)?(?P<host>[\w\-.^_]+)
# Values:  TEXT

failregex =  ^%(__prefix_line)sinfo: ratelimit block .* query <HOST> TYPE255$
             ^%(__prefix_line)sinfo: .* <HOST> refused, no acl matches\.$

ignoreregex =

datepattern = {^LN-BEG}Epoch
              {^LN-BEG}

bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped)
Email: contact@elmoujehidin.net bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped) Email: contact@elmoujehidin.net