CasperSecurity

Current Path : /etc/fail2ban/filter.d/
Upload File :
Current File : //etc/fail2ban/filter.d/nagios.conf

# Fail2Ban filter for Nagios Remote Plugin Executor (nrpe2)
# Detecting unauthorized access to the nrpe2 daemon 
# typically logged in /var/log/messages syslog
#

[INCLUDES]
# Read syslog common prefixes
before = common.conf

[Definition]
_daemon     = nrpe
failregex   = ^%(__prefix_line)sHost <HOST> is not allowed to talk to us!\s*$
ignoreregex =

# DEV Notes:
# 
# Author: Ivo Truxa - 2014/02/03
Hacker Blog, Shell İndir, Sql İnjection, XSS Attacks, LFI Attacks, Social Hacking, Exploit Bot, Proxy Tools, Web Shell, PHP Shell, Alfa Shell İndir, Hacking Training Set, DDoS Script, Denial Of Service, Botnet, RFI Attacks, Encryption
Telegram @BIBIL_0DAY