File pathbantime = 3600 findtime = 300 maxretry = 3Servicefail2ban start service
4. unbind the IP address bound to fail2ban
Query limit list # iptables-L -- line-numbersChainfail2ban-SSH (1 references) num
Target
Prot opt source
Destination1
DROP
All
--
118.152.158.61.ha.cnc
Anywhere2
RETURN
All
--
Anywhere
Remove restrictions from anywhere #
Iptables-D
Fail2ban-SSH
1
We mainly edit the configuration file jail. conf. Do not worry about it.
# Vi/etc/fail2ban. conf
SSH attack pr
Access to this is a mistake:
Read the log:
Reply content:
Access to this is a mistake:
Read the log:
The master gives the configuration is not complete, I follow the existing to tell the possibility of error:
The directory that is accessed in log is D:/nginx_project/whois/whois , maybe the main thing is actually want to access D:/nginx_project/who
;)
Define ('ipdata', 'ipdata. db ');
// Get ip
$ Ip = isset ($ _ GET ['IP'])? $ _ GET ['IP']: getenv ("REMOTE_ADDR ");
Echo "IP: ARIN ";
If (-1 = ($ ip = ip2long ($ ip) die ("Invalid IP ");
$ Ip = sprintf ("% u", $ ip );
$ Country = $ city = '';
Echo"
Record No: ". Whois ($ ip, $ country, $ city );
Echo"
Location: [] ";
Function Whois ($ ip, $ country, $ city)
{
// Open ip-database
If (NULL = ($ fp
For Port 43 connected to the fsockopen function, I am now working on a program for querying the whois information of the domain name. now some domain names can be queried, such as com and net domain names. Some types cannot be found. for example, if I want to query the whois information of the cn domain name, the code always fails: PHPcode $ query = quot; www. about port 43 of the fsockopen function connec
, consecteturadipiscing elit. Nunc ut elit id mi ultriciesadipiscing. Nulla Facilisi. Praesent pulvinar,sapien vel feugiat vestibulum, nulla dui pretium orci,non ultricies elit lacus quis ante. Lorem ipsum dolorsit amet, consectetur adipiscing elit. Aliquampretium ullamcorper Urna quis iaculis. Etiam ac massased turpis tempor luctus. Curabitur sed nibh eu elitmollis congue. Praesent ipsum diam, Consectetur vitaeornare A, aliquam a nunc. In ID magna pellentesquetellus posuere adipiscing. Sed non
Domain name |
analysis of the Domain name deletion law and domain name interpretation-this article for the webmaster to protect their domain name is not malicious registration is very good help, it is worth a look. A, the domain name expires after the first stage is the domain name expires within 1-45 days will be in the Registrar retention status. Whois English status: Registrar-hold.
B, domain name after the expiration of the second stage is the R
I. Public Web siteWe can collect information about the target domain through the public Web site so that we do not have to send data directly to the target network, thus avoiding making the target aware of our actions.Self-Baidu, no longer repeat.Two. Registration information for domain namesThe WHOIS database records the DNS server information for the domain name and the registrant's contact information, etc.Kali Linux defaults to a
not pre-installed. Tracepath traces the network path to the specified destination address and gives each hop (hop) on the path. If your network has problems or is slow, tracepath can find out where the network is broken or slow.
The code is as follows:
Tracepath example.com
4.mtr
The MTR command synthesizes a ping command and a Tracepath command. MTR will continue to contract and show the time it takes for each ping to be bounced. Any problems in the process are also displayed,
Whois
Feature Description: Find and display user information.
Syntax: whois [account name]
Supplemental Note: The WHOIS directive will go to find and display the user related information of the specified account, because it is to network Solutions's whois database to look up, so the account name must be registered o
Every programmer and developer likes to talk about their favorite pieces of code, especially when PHP developers spend hours coding or creating apps for the web, they know the importance of the code. In order to save the coding time, the author collects some useful code snippets to help the developers improve their work efficiency. >>>
1 whois query using php--use PHP to get WHOIS requests
Using this code
can be overwritten by other segments.#忽略IP, the IP in this list will not be blockedIgnoreip = 127.0.0.1 172.13.14.15#屏蔽时间Bantime = 600#发现时间, retries over a specified number of times during this period will activate Fail2banFindtime = 600#尝试次数Maxretry = 3#日志修改检测机制Backend = Auto
[Ssh-iptables]#激活Enabled = True#filter的名字, under the FILTER.D directoryFilter = sshd#所采用的工作, according to the name can be found in the ACTION.D directoryAction = Iptables[name=ssh, Port=ssh, Protocol=tcp]Mail-
It ' s like JSON.But fast and small.
Messagepack is an efficient binary serialization format. It lets your Exchange data among multiple languages like JSON. But it ' s faster and smaller. Small integers is encoded into a single byte, and typical short strings require only one extra byte in addition to the St Rings themselves.
Messagepack is an efficient binary serialization format. It allows you to exchange data between languages like JSON. But it's faster and smaller than JSON. A smal
fully meet various application scenarios and needs from the smart cloud to the smart edge.
In terms of how Microsoft's smart cloud trigger gathers in China, Office 365 is also worth mentioning. Currently, Office 365 accounts for 23% of China's Saas market share, and its business has increased by 500% in the four years since it entered the Chinese market. It has served more than 1.8 million enterprise users and more than 20 million education users. Office 365 also meets the strictest
Original: ASP. NET Core 2.1.0 now availableToday, we are pleased to be able to publish ASP. NET Core 2.1.0! This is us. NET platform, the latest version of the open-source, cross-platform WEB framework is now ready for production use. Start using ASP. NET Core 2.1 today!New features in this release include the following:
SignalR-Add real-time networking capabilities to your ASP. NET Core application.
Razor class Libraries-use Razor to build views and pages into reusable class librar
pellentesquetellus posuere adipiscing. Sed non mi metus, at laciniaaugue. Sed magna nisi, ornare in mollis in, mollissed nunc. Etiam at justo in leo congue mollis.Nullam in neque eget metus hendrerit scelerisqueeu non enim. Ut malesuada lacus eu nulla bibendumid euismod urna sodales. ";$compressed = gzcompress($string);echo "Original size: ". strlen($string)."\n";/* printsOriginal size: 800*/echo "Compressed size: ". strlen($compressed)."\n";/* printsCompressed size: 418*/// getting it back$ori
congue. Praesent ipsum diam, consectetur vitae ornare a, aliquam a nunc. In id magna pellentesque tellus posuere adipiscing. Sed non mi metus, at lacinia augue. Sed magna nisi, ornare in mollis in, mollis sed nunc. Etiam at justo in leo congue mollis. Nullam in neque eget metus hendrerit scelerisque eu non enim. Ut malesuada lacus eu nulla bibendum id euismod urna sodales. "; $compressed = gzcompress($string); echo "Original size: ". strlen($string)."\n"; /
= $curlopt _useragent, Curlopt_url = $url, Curlopt_timeout = 1, curlopt_referer = ' http:/'. $_server[' Http_host '],); Curl_setopt_array ($ch, $curl _opt); $content = curl_exec ($ch); if (!is_null ($curl _info)) {$curl _info = Curl_getinfo ($ch); } curl_close ($ch); if (Preg_match (' {
Grammar:
5. Get the source code for the Web page
Use the following function to get the HTML code for any Web page
function Display_sourcecode ($url) {$lines = file ($ur
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.