One Hat Cyber Team
Your IP :
3.131.83.165
Server IP :
104.21.32.1
Server :
Linux agrigation-prod 5.15.0-67-generic #74-Ubuntu SMP Wed Feb 22 14:14:39 UTC 2023 x86_64
Server Software :
nginx/1.24.0
PHP Version :
7.4.33
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
etc
/
fail2ban
/
filter.d
/
Edit File:
nagios.conf
# Fail2Ban filter for Nagios Remote Plugin Executor (nrpe2) # Detecting unauthorized access to the nrpe2 daemon # typically logged in /var/log/messages syslog # [INCLUDES] # Read syslog common prefixes before = common.conf [Definition] _daemon = nrpe failregex = ^%(__prefix_line)sHost <HOST> is not allowed to talk to us!\s*$ ignoreregex = # DEV Notes: # # Author: Ivo Truxa - 2014/02/03
Simpan