Yes, this page is deliberately public, there is no need to report it to our security team and if you do we'll just ignore the report.Ulteriori informazioni

Iptables Statistics:
# Generated by iptables-save v1.8.5 on Wed Aug 12 20:44:23 2020
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT DROP [0:0]
-A INPUT -s 141.98.10.141/32 -j DROP
-A INPUT -s 209.141.47.222/32 -j DROP
-A INPUT -s 37.49.224.33/32 -j DROP
-A INPUT -s 192.35.169.31/32 -j DROP
-A INPUT -s 94.102.49.193/32 -j DROP
-A INPUT -s 89.248.168.217/32 -j DROP
-A INPUT -s 45.143.223.172/32 -j DROP
-A INPUT -s 78.128.113.99/32 -j DROP
-A INPUT -s 141.98.80.27/32 -j DROP
-A INPUT -s 211.154.219.69/32 -j DROP
-A INPUT -s 104.223.170.93/32 -j DROP
-A INPUT -s 173.254.192.204/32 -j DROP
-A INPUT -s 185.234.217.48/32 -j DROP
-A INPUT -s 170.130.18.12/32 -j DROP
-A INPUT -s 185.234.216.218/32 -j DROP
-A INPUT -s 185.234.217.191/32 -j DROP
-A INPUT -s 185.234.216.178/32 -j DROP
-A INPUT -s 185.234.219.105/32 -j DROP
-A INPUT -s 170.130.18.19/32 -j DROP
-A INPUT -s 170.130.18.18/32 -j DROP
-A INPUT -s 185.234.216.210/32 -j DROP
-A INPUT -s 170.130.209.0/24 -j DROP
-A INPUT -s 185.234.219.81/32 -j DROP
-A INPUT -s 185.234.217.164/32 -j DROP
-A INPUT -s 87.117.216.211/32 -j DROP
-A INPUT -s 72.11.135.222/32 -j DROP
-A INPUT -s 96.44.162.82/32 -j DROP
-A INPUT -s 185.234.216.159/32 -j DROP
-A INPUT -s 87.246.7.5/32 -j DROP
-A INPUT -s 72.11.135.218/32 -j DROP
-A INPUT -s 92.118.38.82/32 -j DROP
-A INPUT -s 185.234.219.82/32 -j DROP
-A INPUT -s 192.35.169.27/32 -j DROP
-A INPUT -s 192.35.169.24/32 -j DROP
-A INPUT -s 192.35.169.23/32 -j DROP
-A INPUT -s 185.165.190.34/32 -j DROP
-A INPUT -s 60.190.248.10/32 -j DROP
-A INPUT -s 94.102.56.130/32 -j DROP
-A INPUT -s 192.35.169.18/32 -j DROP
-A INPUT -s 192.35.169.25/32 -j DROP
-A INPUT -s 94.102.56.130/32 -j DROP
-A INPUT -s 198.20.70.114/32 -j DROP
-A INPUT -s 185.142.239.16/32 -j DROP
-A INPUT -s 83.97.20.164/32 -j DROP
-A INPUT -s 218.75.38.210/32 -j DROP
-A INPUT -s 193.169.252.21/32 -j DROP
-A INPUT -s 66.240.219.146/32 -j DROP
-A INPUT -s 80.82.77.33/32 -j DROP
-A INPUT -s 202.107.207.226/32 -j DROP
-A INPUT -s 5.182.210.16/32 -j DROP
-A INPUT -s 193.37.255.114/32 -j DROP
-A INPUT -s 118.193.31.182/32 -j DROP
-A INPUT -s 54.39.215.32/32 -j DROP
-A INPUT -s 202.96.99.85/32 -j DROP
-A INPUT -s 94.102.49.190/32 -j DROP
-A INPUT -s 71.6.167.142/32 -j DROP
-A INPUT -s 183.136.225.45/32 -j DROP
-A INPUT -s 202.107.207.228/32 -j DROP
-A INPUT -s 71.6.199.23/32 -j DROP
-A INPUT -s 43.245.222.163/32 -j DROP
-A INPUT -s 185.142.236.35/32 -j DROP
-A INPUT -s 71.6.146.186/32 -j DROP
-A INPUT -s 93.174.95.106/32 -j DROP
-A INPUT -s 64.64.104.10/32 -j DROP
-A INPUT -s 122.228.19.79/32 -j DROP
-A INPUT -s 71.6.146.185/32 -j DROP
-A INPUT -s 60.190.226.188/32 -j DROP
-A INPUT -s 5.182.210.101/32 -j DROP
-A INPUT -s 146.88.240.4/32 -j DROP
-A INPUT -s 45.56.110.145/32 -j DROP
-A INPUT -s 223.71.167.164/32 -j DROP
-A INPUT -s 71.6.135.131/32 -j DROP
-A INPUT -i lo -j ACCEPT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -m limit --limit 5/min --limit-burst 7 -j LOG --log-prefix "Drop Sync: " --log-level 7
-A INPUT -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j DROP
-A INPUT -f -m limit --limit 5/min --limit-burst 7 -j LOG --log-prefix "Fragments Packets: " --log-level 7
-A INPUT -f -j DROP
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,PSH,URG -j DROP
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,SYN,RST,PSH,ACK,URG -j DROP
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -m limit --limit 5/min --limit-burst 7 -j LOG --log-prefix "NULL Packets: " --log-level 7
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP
-A INPUT -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -m limit --limit 5/min --limit-burst 7 -j LOG --log-prefix "XMAS Packets: " --log-level 7
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROP
-A INPUT -p tcp -m tcp --tcp-flags FIN,ACK FIN -m limit --limit 5/min --limit-burst 7 -j LOG --log-prefix "Fin Packets Scan: " --log-level 7
-A INPUT -p tcp -m tcp --tcp-flags FIN,ACK FIN -j DROP
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,SYN,RST,ACK,URG -j DROP
-A INPUT -p tcp -m tcp --dport 37 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 110 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 143 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 113 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 23 -j ACCEPT
-A INPUT -p udp -m udp --dport 512 -j ACCEPT
-A INPUT -p udp -m udp --dport 37 -j ACCEPT
-A INPUT -p udp -m udp --dport 123 -j LOG --log-prefix "Iptables ntpd: " --log-level 7
-A INPUT -p udp -m udp --dport 123 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 21 -j LOG --log-prefix "Iptables ftpd(21): " --log-level 7
-A INPUT -p tcp -m iprange --src-range 192.168.1.1-192.168.1.10 -m tcp --dport 21 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 20 -j LOG --log-prefix "Iptables ftpd(20): " --log-level 7
-A INPUT -p tcp -m iprange --src-range 192.168.1.1-192.168.1.10 -m tcp --dport 20 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 25 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 587 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 53 -j ACCEPT
-A INPUT -p udp -m udp --dport 53 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 5353 -j ACCEPT
-A INPUT -p udp -m udp --dport 5353 -j ACCEPT
-A INPUT -p udp -m udp --dport 137 -j ACCEPT
-A INPUT -p udp -m udp --dport 138 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 139 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 445 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 1970 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 2222 -m state --state NEW -m recent --set --name SSH --mask 255.255.255.255 --rsource -j ACCEPT
-A INPUT -p tcp -m tcp --dport 2222 -m recent --rcheck --seconds 60 --hitcount 5 --name SSH --mask 255.255.255.255 --rsource -j LOG --log-prefix "SSH attack: " --log-level 7
-A INPUT -p tcp -m tcp --dport 2222 -m recent --update --seconds 60 --hitcount 5 --name SSH --mask 255.255.255.255 --rsource -j DROP
-A INPUT -p udp -m udp --dport 514 -j ACCEPT
-A INPUT -p udp -m udp --dport 1194 -j ACCEPT
-A INPUT -m pkttype --pkt-type multicast -j ACCEPT
-A INPUT -m state --state INVALID -j DROP
-A INPUT -p icmp -m limit --limit 10/sec -j ACCEPT
-A INPUT -p icmp -j DROP
-A INPUT -j LOG --log-prefix "INPUT:  " --log-level 7
-A INPUT -j DROP
-A OUTPUT -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -j REJECT --reject-with tcp-reset
-A OUTPUT -m state --state INVALID -j DROP
-A OUTPUT -o lo -j ACCEPT
COMMIT
# Completed on Wed Aug 12 20:44:23 2020

Roberto CORRADO

 

Cossato

download my vCardbiglietto da visita elettronico

exec. time 475 ms