Software: Apache. PHP/8.3.27 uname -a: Linux pdx1-shared-a4-04 6.6.104-grsec-jammy+ #3 SMP Tue Sep 16 00:28:11 UTC 2025 x86_64 uid=6659440(dh_z2jmpm) gid=2086089(pg10499364) groups=2086089(pg10499364) Safe-mode: OFF (not secure) /etc/fail2ban/action.d/ drwxr-xr-x | |
| Viewing file: Select action/file-type: # Fail2Ban configuration file # # Author: Michael Gebetsroither # # This is for blocking whole hosts through blackhole routes. # # PRO: # - Works on all kernel versions and as no compatibility problems (back to debian lenny and WAY further). # - It's FAST for very large numbers of blocked ips. # - It's FAST because it Blocks traffic before it enters common iptables chains used for filtering. # - It's per host, ideal as action against ssh password bruteforcing to block further attack attempts. # - No additional software required beside iproute/iproute2 # # CON: # - Blocking is per IP and NOT per service, but ideal as action against ssh password bruteforcing hosts [Definition] actionban = ip route add <blocktype> <ip> actionunban = ip route del <blocktype> <ip> actioncheck = actionstart = actionstop = [Init] # Option: blocktype # Note: Type can be blackhole, unreachable and prohibit. Unreachable and prohibit correspond to the ICMP reject messages. # Values: STRING blocktype = unreachable |
:: Command execute :: | |
--[ c99shell v. 2.5 [PHP 8 Update] [24.05.2025] | Generation time: 0.0178 ]-- |