uawdijnntqw1x1x1
IP : 216.73.216.137
Hostname : xhost1.intravision.ru
Kernel : Linux xhost1.intravision.ru 3.16.0-7-amd64 #1 SMP Debian 3.16.59-1 (2018-10-03) x86_64
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
OS : Linux
PATH:
/
var
/
lib
/
bind
/
..
/
..
/
..
/
etc
/
python3.4
/
..
/
python3
/
..
/
python
/
..
/
sysctl.d
/
..
/
fail2ban
/
jail.local
/
/
# ISPsystem start [ssh] maxretry = 5 enabled = true findtime = 3600 bantime = 3600 ignoreip = 192.168.2.92 # ISPsystem end # выявляем потенциальные сканирования для применения эксплойтов и php уязвимостей [apache-noscript] enabled = true port = http,https filter = apache-noscript logpath = /var/log/apache2/other_vhosts_access.log bantime = 3600 maxretry = 6 # выявляем попытки переполнения Апача [apache-overflows] enabled = true port = http,https filter = apache-overflows logpath = /var/log/apache2/other_vhosts_access.log bantime = 3600 maxretry = 2
/var/lib/bind/../../../etc/python3.4/../python3/../python/../sysctl.d/../fail2ban/jail.local