__  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

www-data@216.73.216.10: ~ $
# failJSON: { "time": "2005-02-16T23:33:20", "match": true , "host": "190.5.230.178" }
Feb 16 23:33:20 smtp1 sm-mta[5133]: s1GNXHYB005133: [190.5.230.178]: possible SMTP attack: command=AUTH, count=5

# failJSON: { "time": "2005-02-16T23:40:36", "match": true , "host": "75.176.164.191" }
Feb 16 23:40:36 smtp1 sm-mta[5178]: s1GNeNqe005178: cpe-075-176-164-191.sc.res.rr.com [75.176.164.191]: possible SMTP attack: command=AUTH, count=5

# failJSON: { "time": "2005-02-24T12:10:15", "match": true , "host": "211.75.6.133" }
Feb 24 12:10:15 kismet sm-acceptingconnections[32053]: s1OHA28u032053: 211-75-6-133.HINET-IP.hinet.net [211.75.6.133]: possible SMTP attack: command=AUTH, count=6

# failJSON: { "time": "2005-02-24T13:00:17", "match": true , "host": "95.70.241.192" }
Feb 24 13:00:17 kismet sm-acceptingconnections[1499]: s1OHxxSn001499: 192.241.70.95.dsl.static.turk.net [95.70.241.192] (may be forged): possible SMTP attack: command=AUTH, count=6

# gh-1632, Fedora 24/RHEL - the daemon name is "sendmail":
# failJSON: { "time": "2005-02-24T14:00:00", "match": true , "host": "192.0.2.1" }
Feb 24 14:00:00 server sendmail[26592]: u0CB32qX026592: [192.0.2.1]: possible SMTP attack: command=AUTH, count=5

# failJSON: { "time": "2005-02-24T14:00:01", "match": true , "host": "192.0.2.2", "desc": "long PID, ID longer as 14 chars (gh-2563)" }
Feb 24 14:00:01 server sendmail[3529566]: xA32R2PQ3529566: [192.0.2.2]: possible SMTP attack: command=AUTH, count=5

# failJSON: { "time": "2005-02-25T04:02:27", "match": true , "host": "192.0.2.3", "desc": "sendmail 8.16.1, AUTH_FAIL_LOG_USER (gh-2757)" }
Feb 25 04:02:27 relay1 sendmail[16664]: 06I02CNi016764: AUTH failure (LOGIN): authentication failure (-13) SASL(-13): authentication failure: checkpass failed, user=user@example.com, relay=example.com [192.0.2.3] (may be forged)
# failJSON: { "time": "2005-02-25T04:02:28", "match": true , "host": "192.0.2.4", "desc": "injection attempt on user name" }
Feb 25 04:02:28 relay1 sendmail[16665]: 06I02CNi016765: AUTH failure (LOGIN): authentication failure (-13) SASL(-13): authentication failure: checkpass failed, user=criminal, relay=[192.0.2.100], relay=[192.0.2.4] (may be forged)

# failJSON: { "time": "2005-05-24T01:58:40", "match": true , "host": "192.0.2.5", "desc": "user not found (gh-3030)" }
May 24 01:58:40 server sm-mta[65696]: 14NNwaRl065696: AUTH failure (DIGEST-MD5): user not found (-20) SASL(-13): user not found: unable to canonify user and get auxprops, user=scanner, relay=[192.0.2.5]
# failJSON: { "time": "2005-05-24T01:59:07", "match": true , "host": "192.0.2.6", "desc": "user not found (gh-3030)" }
May 24 01:59:07 server sm-mta[65815]: 14NNx65Q065815: AUTH failure (CRAM-MD5): user not found (-20) SASL(-13): user not found: user: scan@server.example.com property: userPassword not found in sasldb /usr/local/etc/sasldb2, user=scan, relay=[192.0.2.6]

# failJSON: { "time": "2005-05-29T23:14:04", "match": true , "host": "192.0.2.7", "desc": "authentication failure, sendmail 8.16.1 (gh-2757)" }
May 29 23:14:04 mail sendmail[5976]: 09DJDgOM005976: AUTH failure (login): authentication failure (-13) SASL(-13): authentication failure: checkpass failed, user=test, relay=host.example.com [192.0.2.7] (may be forged)
# failJSON: { "time": "2005-05-29T23:14:04", "match": true , "host": "192.0.2.8", "desc": "authentication failure, sendmail 8.16.1 (gh-2757)" }
May 29 23:14:04 mail sendmail[5976]: 09DJDgOM005976: AUTH failure (PLAIN): authentication failure (-13) SASL(-13): authentication failure: Password verification failed, user=test, relay=host.example.com [192.0.2.8]
# failJSON: { "time": "2005-05-29T23:14:05", "match": true , "host": "192.0.2.9", "desc": "authentication failure, no user part (gh-2757)" }
May 29 23:14:05 server sendmail[25411]: 26H8MRrS025411: AUTH failure (LOGIN): authentication failure (-13) SASL(-13): authentication failure: checkpass failed, relay=[192.0.2.9]

Filemanager

Name Type Size Permission Actions
bsd Folder 0755
3proxy File 575 B 0644
apache-auth File 12.5 KB 0644
apache-badbots File 688 B 0644
apache-botsearch File 3.66 KB 0644
apache-fakegooglebot File 480 B 0644
apache-modsecurity File 2.59 KB 0644
apache-nohome File 406 B 0644
apache-noscript File 2.64 KB 0644
apache-overflows File 2.7 KB 0644
apache-pass File 273 B 0644
apache-shellshock File 499 B 0644
assp File 5.09 KB 0644
asterisk File 13.64 KB 0644
bitwarden File 741 B 0644
centreon File 252 B 0644
counter-strike File 399 B 0644
courier-auth File 1.04 KB 0644
courier-smtp File 1.69 KB 0644
cyrus-imap File 2.4 KB 0644
directadmin File 835 B 0644
domino-smtp File 1.26 KB 0644
dovecot File 16.25 KB 0644
dropbear File 1.3 KB 0644
drupal-auth File 2.31 KB 0644
ejabberd-auth File 1.46 KB 0644
exim File 10.2 KB 0644
exim-spam File 3.38 KB 0644
freeswitch File 2.33 KB 0644
froxlor-auth File 354 B 0644
gitlab File 392 B 0644
grafana File 564 B 0644
groupoffice File 309 B 0644
gssftpd File 176 B 0644
guacamole File 1016 B 0644
haproxy-http-auth File 943 B 0644
horde File 567 B 0644
kerio File 3.23 KB 0644
lighttpd-auth File 1.36 KB 0644
mongodb-auth File 2 KB 0644
monit File 2.35 KB 0644
monitorix File 863 B 0644
mssql-auth File 1.26 KB 0644
murmur File 702 B 0644
mysqld-auth File 3.61 KB 0644
nagios File 226 B 0644
named-refused File 3.22 KB 0644
nginx-bad-request File 1.37 KB 0644
nginx-botsearch File 2.64 KB 0644
nginx-http-auth File 3.6 KB 0644
nginx-limit-req File 1.14 KB 0644
nsd File 648 B 0644
openhab File 692 B 0644
openwebmail File 615 B 0644
oracleims File 1.8 KB 0644
pam-generic File 2.37 KB 0644
perdition File 589 B 0644
php-url-fopen File 314 B 0644
phpmyadmin-syslog File 177 B 0644
portsentry File 341 B 0644
postfix File 15.87 KB 0644
proftpd File 2.88 KB 0644
pure-ftpd File 195 B 0644
qmail File 830 B 0644
recidive File 1.38 KB 0644
roundcube-auth File 5.42 KB 0644
scanlogd File 854 B 0644
screensharingd File 1.09 KB 0644
selinux-ssh File 3.36 KB 0644
sendmail-auth File 3.84 KB 0644
sendmail-reject File 10.83 KB 0644
sieve File 535 B 0644
slapd File 1.12 KB 0644
softethervpn File 648 B 0644
sogo-auth File 3.47 KB 0644
solid-pop3d File 1.59 KB 0644
squid File 895 B 0644
squirrelmail File 197 B 0644
sshd File 33.6 KB 0644
sshd-journal File 23.82 KB 0644
stunnel File 267 B 0644
suhosin File 1.26 KB 0644
tine20 File 520 B 0644
traefik-auth File 1.81 KB 0644
uwimap-auth File 1.51 KB 0644
vsftpd File 1.1 KB 0644
webmin-auth File 640 B 0644
wuftpd File 631 B 0644
xinetd-fail File 331 B 0644
znc-adminlog File 708 B 0644
zoneminder File 715 B 0644
zzz-generic-example File 4.15 KB 0644
zzz-sshd-obsolete-multiline File 36 B 0644
Filemanager