Software: Apache/2.0.54 (Unix) mod_perl/1.99_09 Perl/v5.8.0 mod_ssl/2.0.54 OpenSSL/0.9.7l DAV/2 FrontPage/5.0.2.2635 PHP/4.4.0 mod_gzip/2.0.26.1a uname -a: Linux snow.he.net 4.4.276-v2-mono-1 #1 SMP Wed Jul 21 11:21:17 PDT 2021 i686 uid=99(nobody) gid=98(nobody) groups=98(nobody) Safe-mode: OFF (not secure) /etc/fail2ban/filter.d/ drwxr-xr-x | |
| Viewing file: Select action/file-type: # Fail2Ban configuration file
#
# Author: Cyril Jaquier
#
# $Revision: 471 $
#
[Definition]
# Option: failregex
# Notes.: regex to match the password failures messages in the logfile. The
# host must be matched by a group named "host". The tag "<HOST>" can
# be used for standard IP/hostname matching.
# Values: TEXT
#
failregex = (?:(?:Authentication failure|Failed [-/\w+]+) for(?: [iI](?:llegal|nvalid) user)?|[Ii](?:llegal|nvalid) user|ROOT LOGIN REFUSED) .*(?: from|FROM) <HOST>(?: port \d*)?(?: ssh\d*)?\s*$
Failed password for root from <HOST> port \d* .*$
reverse mapping checking getaddrinfo for.* \[<HOST>\] failed - POSSIBLE BREAK-IN.*$
#Jan 20 14:20:23 frost sshd[6549]: Failed password for root from 200.253.158.134 port 49185 ssh2
#Jan 20 14:20:23 frost sshd[6549]: Failed password for root from 200.253.158.134 port 49185 ssh2
#Jan 20 14:20:23 frost sshd[6548]: Failed password for root from 200.253.158.134 port 43731 ssh2
#Jan 20 14:20:23 frost sshd[6548]: Failed password for root from 200.253.158.134 port 43731 ssh2
#Jan 20 14:20:26 frost sshd[6572]: Failed password for root from 200.253.158.134 port 38423 ssh2
#Jan 20 14:20:26 frost sshd[6572]: Failed password for root from 200.253.158.134 port 38423 ssh2
#Jan 20 14:20:30 frost sshd[6474]: Failed password for root from 113.142.37.114 port 55421 ssh2
#Jan 20 14:20:30 frost sshd[6474]: Failed password for root from 113.142.37.114 port 55421 ssh2
#Jan 20 14:20:34 frost sshd[6590]: Failed password for root from 113.142.37.114 port 56198 ssh2
#Jan 20 14:20:34 frost sshd[6590]: Failed password for root from 113.142.37.114 port 56198 ssh2
# Oct 19 11:17:46 stone sshd[17633]: reverse mapping checking getaddrinfo for 105.49.174.61.dial.wz.zj.dynamic.163data.com.cn [61.174.49.105] failed - POSSIBLE BREAK-IN ATTEMPT!
# Option: ignoreregex
# Notes.: regex to ignore. If this regex matches, the line is ignored.
# Values: TEXT
#
ignoreregex =
|
:: Command execute :: | |
--[ c99shell v. 1.0 pre-release build #13 powered by Captain Crunch Security Team | http://ccteam.ru | Generation time: 0.0255 ]-- |