Result for A9933EFF30C46F9C3F9068BCCEA1C2E1BFCC20AB

Query result

Key Value
FileName./etc/fail2ban/action.d/sendmail-whois-ipmatches.conf
FileSize974
MD50FAD982EFF64AF17E716602B4FC619A9
SHA-1A9933EFF30C46F9C3F9068BCCEA1C2E1BFCC20AB
SHA-25673C6449A32B77085050DFA32EA448EA0B322765861F8EFD8C3C9EC7E21D77A84
SSDEEP24:EWTm0QhYoyaDfWMT3cRwVHHRMT4jah0aVYlEB+:E6l25OM7cRIuTh/Oo+
TLSHT17E112F5B23E8E5BA568514D0844E2E114B62BA3E87433470B55DE0502F86073A76B7EC
hashlookup:parent-total14
hashlookup:trust100

Network graph view

Parents (Total: 14)

The searched file hash is included in 14 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD55EF96E284A6770167CEF565BC796BF26
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's sendmail actions. This is the default mail actions for Fail2Ban.
PackageMaintainerCBS <cbs@centos.org>
PackageNamefail2ban-sendmail
PackageRelease1.el7
PackageVersion0.9.7
SHA-1383DF154C6EFE35D85573A160A721280D28E1B0B
SHA-25601FB7AAF7005CF7574B3D721202B4B5BA2854F4C70726F0BA1A535BC8E8A7835
Key Value
MD58C7381A82C5F83F2C3A7F1A2A115B16E
PackageArchnoarch
PackageDescriptionFail2ban scans log files like /var/log/pwdfail or /var/log/apache/error_log and bans IP that makes too many password failures. It updates firewall rules to reject the IP address. To use the hostsdeny and shorewall actions you must install tcp_wrappers and shorewall respectively.
PackageMaintainerFedora Project
PackageNamefail2ban
PackageRelease1.el6.1
PackageVersion0.9.6
SHA-182976B33BE986F928F3B895B3CE9CEEA59773356
SHA-2565494D678669606897C1CFB851921A8833797F6F697822AA68A1ACA03FA7D942B
Key Value
MD5CEDEDF137315C0BD0C1583EC3E4ABDC2
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's sendmail actions. This is the default mail actions for Fail2Ban.
PackageMaintainerFedora Project
PackageNamefail2ban-sendmail
PackageRelease1.fc23
PackageVersion0.9.3
SHA-12C92CF25B556F6BC9B4F4A25FD60EB49CEB7F0C5
SHA-2568802BD48886CE1A51FEDE60CB2AD0805CBD99823FFC2367E7B72D1F66C7CAC69
Key Value
MD5F1B30BD5BA076F2DC62CED8BA0AC778C
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's sendmail actions. This is the default mail actions for Fail2Ban.
PackageMaintainerFedora Project
PackageNamefail2ban-sendmail
PackageRelease1.fc23
PackageVersion0.9.3
SHA-1C71DB28D83BFD7405A52E5E333CF2C1B15048782
SHA-25679F41B693A1C2A2FA8D6575DACCFE9C8B194745A3BCC8CD5F8A23CFDD7106640
Key Value
FileSize244164
MD55C635C14D4404EF2EF4C943EDA15ED16
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.6-1
SHA-1F64D159FE5506D5931EBC5F2BBC1D9D621CCE895
SHA-2566F30F9E522BEE2D7724FBC32F7704FCB97252915B04AB796D69C3FE7E2AFE36D
Key Value
CRC32A384B5E1
FileName19979
FileSize227028
MD5D4EEDCCF04345C9F642391F7ADCECB86
OpSystemCode362
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.3-1
ProductCode184814
RDS:package_id184814
SHA-15036D57B893C077059EDAA930B763BBC5F180F05
SHA-25677956AE0E2809BBBB6E76F7E228A3B453A4A8DD9F005E812BACD708714DDDB8C
SpecialCode
dbnsrl_legacy
insert-timestamp1648751507.4833016
sourceRDS_2022.03.1_legacy.db
Key Value
FileSize246710
MD5C8A52420FE4F84624C9052D1C5A536F1
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.7-2
SHA-161E92ADB586368933330C293210B31431573E5D4
SHA-256F9DFA8B1A28E43769C09D84C657F69E44F2687648676B3B0DFFB23B929620361
Key Value
MD5C816E201CC094FE8E146CFADEF310D7D
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's sendmail actions. This is the default mail actions for Fail2Ban.
PackageMaintainerFedora Project
PackageNamefail2ban-sendmail
PackageRelease3.fc24
PackageVersion0.9.3
SHA-10FB28585F2BBE47F349BD81DEE88FF7E86C4DB84
SHA-256561CD8140F7F6B11AAE6649504292806779100387F565160183E0223DEBB6B22
Key Value
MD5407CCD226DD702DC6C54709A7F393F05
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's sendmail actions. This is the default mail actions for Fail2Ban.
PackageMaintainerFedora Project
PackageNamefail2ban-sendmail
PackageRelease1.el7
PackageVersion0.9.7
SHA-192C8256D6E6CBCABB2BC63C6EE50F0BAB20E9D0D
SHA-256A53EF1A15E188E14FE1B24CBB98006011E9A6E8F126DF757CAAC50EA06CB785B
Key Value
MD503D64F88998CFC4394008F8E7D24EC21
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's sendmail actions. This is the default mail actions for Fail2Ban.
PackageMaintainerFedora Project
PackageNamefail2ban-sendmail
PackageRelease1.fc23
PackageVersion0.9.3
SHA-12D606DBF41C4E6CC606B42F9621F2143563384D4
SHA-2569B47F62FF02951D0EA8DFB7064447009DF2FEBDAF1A533D8EE628DA5967587FC
Key Value
MD5B68ABA682BA5FE8E602170AB43AB3F76
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's sendmail actions. This is the default mail actions for Fail2Ban.
PackageMaintainerCBS <cbs@centos.org>
PackageNamefail2ban-sendmail
PackageRelease3.el7
PackageVersion0.9.5
SHA-1C76BAFF76809C6143EE866391E012DF8EEC66754
SHA-25628B69FD1387F252044D21622E0A299463972E01BDC5073E1B79B4428385F567E
Key Value
FileSize287540
MD5296E18A9B089BFEFAEF25489CB22FD25
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerYaroslav Halchenko <debian@onerussian.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.6-2
SHA-1A0E32F96A89E86D4994CE9BF224DCA1E281334CC
SHA-256E68BB7AFBD68C53741630C834AB78F093BFC393E88F40B37DC5904F773A371DD
Key Value
MD597C9DDA9B5B7646A28886E8809407B4B
PackageArchnoarch
PackageDescriptionThis package installs Fail2Ban's sendmail actions. This is the default mail actions for Fail2Ban.
PackageMaintainerFedora Project
PackageNamefail2ban-sendmail
PackageRelease3.fc24
PackageVersion0.9.3
SHA-12928EE04BF0C60143890F3AE32BEEEDFEAF85377
SHA-256CD99EA202F0AAA699A6594FBC29191DE5C3D1BF8DADEE7FFF528AEE537A790F2
Key Value
FileSize238368
MD539F32E97DC0FF2CB1C1D5D734998CA37
PackageDescriptionban hosts that cause multiple authentication errors Fail2ban monitors log files (e.g. /var/log/auth.log, /var/log/apache/access.log) and temporarily or persistently bans failure-prone addresses by updating existing firewall rules. Fail2ban allows easy specification of different actions to be taken such as to ban an IP using iptables or hostsdeny rules, or simply to send a notification email. . By default, it comes with filter expressions for various services (sshd, apache, qmail, proftpd, sasl etc.) but configuration can be easily extended for monitoring any other text file. All filters and actions are given in the config files, thus fail2ban can be adopted to be used with a variety of files and firewalls. Following recommends are listed: . - iptables -- default installation uses iptables for banning. You most probably need it - whois -- used by a number of *mail-whois* actions to send notification emails with whois information about attacker hosts. Unless you will use those you don't need whois - python3-pyinotify -- unless you monitor services logs via systemd, you need pyinotify for efficient monitoring for log files changes
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefail2ban
PackageSectionnet
PackageVersion0.9.5-1
SHA-13A45D72F6B98A1F431D4E47B45E02E4E44A3738D
SHA-25615957088AFF14983E3BA5A24880DC0E3D22F1A76690CCAE6EFC717B6872C22B3