Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- /*
- Basic config for BOPM on EFnet by mofo, based on the sample configuration
- Contact bopm@mofo.nl for questions/remarks/errors/suggestions.
- Last modified: Sat Apr 14 01:57:00 CEST 2007
- */
- options {
- pidfile = "/home/ircd/bopm/bopm.pid"; /* CHANGE THIS */
- dns_fdlimit = 64;
- };
- IRC {
- /*
- *
- * The next block is for setting up the irc part.
- * You do need to change this
- *
- */
- nick = "ProxyScanner";
- realname = "Monitor de Proxys";
- username = "Scanner";
- server = "irc.somoschat.me";
- # password = "secret";
- port = 6667;
- nickserv = "privmsg nick :identify 8uJi6JBI-scanner";
- oper = "ProxyScanner ProxyScanner-scanner";
- mode = "+oB +cC";
- away = "I'm a reBoT. Your messages will be ignored | Soy un reBoT. Tus mensajes serán ignorados.";
- channel {
- name = "#Servicios";
- # key = "somekey";
- invite = "privmsg chan :invite #Servicios";
- };
- connregex = "\\*\\*\\* Notice -- Client connecting.*: ([^ ]+) \\(([^@]+)@([^\\)]+)\\) \\[([0-9\\.]+)\\].*";
- # connregex = "\\*\\*\\* .*CONNECT: Client connecting.*: ([^ ]+)!([^@]+)@([^\\)]+) \\(([0-9\\.]+)\\) \\[.*\\]";
- # connregex = "\\*\\*\\* CONNECT: Client connecting on port [0-9]+: ([^ ]+)!([^@]+)@([^\\)]+) \\[([0-9\\.]+)\\] \\[.*\\]";
- /*
- *
- * %n User's nick
- * %u User's username
- * %h User's irc hostname
- * %i User's IP address
- *
- */
- # kline = "KLINE 1440 *@%h ON * :Open Proxy found on your IP %i . Please check your system and fix it.";
- kline = "KLINE *@%h 0 :Proxy abierto se encuentra en su conexión. Por favor, visite www.blitzed.org/proxy?ip%=i para obtener más información";
- };
- OPM {
- /*
- *
- * Please check the validity of using : signs in the K-line reason. If it is not supported,
- * you should change the kline rules below to something without the : sign
- *
- */
- blacklist {
- name = "dnsbl.dronebl.org";
- type = "A record reply";
- reply {
- 3 = "IRC Drone";
- 4 = "Tor";
- 5 = "Bottler";
- 6 = "Unknown spambot or drone";
- 7 = "DDOS Drone";
- 8 = "SOCKS Proxy";
- 9 = "HTTP Proxy";
- 10 = "ProxyChain";
- };
- ban_unknown = yes;
- kline = "gline +*@%i 30d :Drone Gasite. Daca doriti except la ip pentru Informatii trimite-ti un mail la: contact@romaniachat.ro";
- };
- blacklist {
- name = "tor.dnsbl.sectoor.de";
- type = "A record reply";
- reply {
- 1 = "Tor exit server";
- };
- ban_unknown = yes;
- kline = "KLINE *@%h 30d :Tor Proxy. Daca doriti except la ip pentru Informatii trimite-ti un mail la: contact@romaniachat.ro";
- };
- blacklist {
- name = "ircbl.ahbl.org";
- type = "A record reply";
- ban_unknown = yes;
- reply {
- 2 = "Open proxy";
- };
- kline = "KLINE *@%h 30d :Proxy Gasit. Daca doriti except la ip pentru Informatii trimite-ti un mail la: contact@romaniachat.ro";
- };
- blacklist {
- name = "rbl.efnet.org";
- type = "A record reply";
- reply {
- 1 = "Open proxy";
- 2 = "Trojan spreader";
- 3 = "Trojan infected client";
- 4 = "TOR exit server";
- 5 = "Drones / Flooding";
- };
- ban_unknown = yes;
- kline = "KLINE *@%h 30d :Proxy Gasit. Daca doriti except la ip pentru Informatii trimite-ti un mail la: abuse@somoschat.com";
- };
- # dnsbl_from = "mybopm@myserver.org";
- # dnsbl_to = "bopm@reports.blitzed.org";
- # sendmail = "/usr/sbin/sendmail";
- };
- scanner {
- name="default";
- /*
- *
- * The next block of protocols is generated from the
- * generated weekly blitzed lists and by a generated
- * list of all newly found open proxies via the anal
- * scans performed by the XS4ALL BOPM bots.
- * The lists reflect the top hits in the period
- * from 2007.01.01 - 2007.04.13
- *
- * If you do not want to scan at all and only check
- * via the DNSBL's, you should comment all the
- * protocol lines out. I highly recommend you do
- * perform scans though. It's 165 in total, but it is
- * a good reflection of the most basic scans a
- * server should check on.
- *
- */
- protocol = ROUTER:23;
- protocol = SOCKS4:559;
- protocol = HTTPPOST:3128;
- protocol = SOCKS4:1080;
- protocol = SOCKS5:60088;
- protocol = HTTP:8080;
- protocol = SOCKS5:1182;
- protocol = HTTP:3128;
- protocol = HTTPPOST:8080;
- protocol = SOCKS4:9999;
- protocol = HTTPPOST:80;
- protocol = SOCKS5:1080;
- protocol = HTTP:63000;
- protocol = HTTP:8000;
- protocol = HTTPPOST:808;
- protocol = HTTP:80;
- protocol = HTTPPOST:6588;
- protocol = HTTP:6588;
- protocol = SOCKS5:3128;
- protocol = SOCKS5:10080;
- protocol = HTTPPOST:4480;
- protocol = SOCKS4:6664;
- protocol = SOCKS4:63808;
- protocol = HTTP:6667;
- protocol = SOCKS4:19991;
- protocol = SOCKS4:1098;
- protocol = SOCKS4:10000;
- protocol = SOCKS4:4471;
- protocol = HTTP:65506;
- protocol = HTTP:63809;
- protocol = SOCKS5:9090;
- protocol = HTTP:9090;
- protocol = HTTP:6668;
- protocol = SOCKS4:58;
- protocol = SOCKS5:58;
- protocol = SOCKS4:6969;
- protocol = WINGATE:23;
- protocol = SOCKS5:3380;
- protocol = SOCKS4:40;
- protocol = SOCKS5:443;
- protocol = SOCKS4:8888;
- protocol = HTTPPOST:9090;
- protocol = HTTP:5490;
- protocol = SOCKS4:8080;
- protocol = SOCKS5:6969;
- protocol = SOCKS4:1026;
- protocol = SOCKS4:1025;
- protocol = HTTP:8888;
- protocol = HTTP:6669;
- protocol = HTTP:8090;
- protocol = HTTP:808;
- protocol = SOCKS5:1029;
- protocol = SOCKS4:41080;
- protocol = SOCKS5:8020;
- protocol = SOCKS5:6000;
- protocol = HTTPPOST:8081;
- protocol = HTTP:4480;
- protocol = SOCKS5:1027;
- protocol = SOCKS4:1028;
- protocol = HTTP:3332;
- protocol = SOCKS5:8888;
- protocol = SOCKS5:1028;
- protocol = SOCKS4:3330;
- protocol = SOCKS4:29992;
- protocol = SOCKS4:1234;
- protocol = SOCKS4:1029;
- protocol = HTTP:5000;
- protocol = HTTP:443;
- protocol = SOCKS5:1813;
- protocol = SOCKS5:1081;
- protocol = SOCKS5:1026;
- protocol = SOCKS4:1337;
- protocol = SOCKS4:1050;
- protocol = HTTP:1080;
- protocol = SOCKS5:9999;
- protocol = SOCKS5:9100;
- protocol = SOCKS5:19991;
- protocol = SOCKS5:1098;
- protocol = SOCKS4:9100;
- protocol = SOCKS4:7080;
- protocol = SOCKS4:1033;
- protocol = HTTP:9000;
- protocol = HTTP:5800;
- protocol = HTTP:5634;
- protocol = HTTP:4471;
- protocol = HTTP:3382;
- protocol = SOCKS5:1200;
- protocol = SOCKS5:1039;
- protocol = SOCKS5:1025;
- protocol = SOCKS4:8002;
- protocol = SOCKS4:6748;
- protocol = SOCKS4:44548;
- protocol = SOCKS4:3380;
- protocol = SOCKS4:32167;
- protocol = SOCKS4:2000;
- protocol = SOCKS4:1979;
- protocol = SOCKS4:12654;
- protocol = SOCKS4:11225;
- protocol = SOCKS4:1066;
- protocol = SOCKS4:1030;
- protocol = SOCKS4:1027;
- protocol = SOCKS4:10099;
- protocol = HTTP:81;
- protocol = HTTP:6665;
- protocol = HTTP:6664;
- protocol = HTTP:6663;
- protocol = SOCKS5:8278;
- protocol = SOCKS5:6748;
- protocol = SOCKS5:4914;
- protocol = SOCKS5:4471;
- protocol = SOCKS5:29992;
- protocol = SOCKS5:17235;
- protocol = SOCKS5:1234;
- protocol = SOCKS5:1202;
- protocol = SOCKS5:1180;
- protocol = SOCKS5:1075;
- protocol = SOCKS5:1033;
- protocol = SOCKS5:10000;
- protocol = SOCKS4:8020;
- protocol = SOCKS4:4044;
- protocol = SOCKS4:3128;
- protocol = SOCKS4:3127;
- protocol = SOCKS4:28882;
- protocol = SOCKS4:24973;
- protocol = SOCKS4:21421;
- protocol = SOCKS4:1182;
- protocol = SOCKS4:1032;
- protocol = SOCKS4:10242;
- protocol = HTTPPOST:8089;
- protocol = HTTP:8082;
- protocol = HTTP:6661;
- protocol = HTTP:35233;
- protocol = HTTP:19991;
- protocol = HTTP:1098;
- protocol = HTTP:1050;
- protocol = SOCKS5:9988;
- protocol = SOCKS5:8080;
- protocol = SOCKS5:8009;
- protocol = SOCKS5:6561;
- protocol = SOCKS5:24971;
- protocol = SOCKS5:18844;
- protocol = SOCKS5:1122;
- protocol = SOCKS5:10777;
- protocol = SOCKS5:1030;
- protocol = SOCKS5:10130;
- protocol = SOCKS5:10099;
- protocol = SOCKS4:8751;
- protocol = SOCKS4:8278;
- protocol = SOCKS4:8111;
- protocol = SOCKS4:7007;
- protocol = SOCKS4:6551;
- protocol = SOCKS4:5353;
- protocol = SOCKS4:443;
- protocol = SOCKS4:43341;
- protocol = SOCKS4:3801;
- protocol = SOCKS4:2280;
- protocol = SOCKS4:1978;
- protocol = SOCKS4:1212;
- protocol = SOCKS4:1039;
- protocol = SOCKS4:1031;
- protocol = HTTPPOST:81;
- protocol = HTTP:9988;
- protocol = HTTP:7868;
- protocol = HTTP:7070;
- protocol = HTTP:444;
- protocol = HTTP:1200;
- protocol = HTTP:1039;
- vhost = "142.44.247.41";
- /*
- *
- * Note: it is really important to have enough file descriptors
- * available to the bopm process.
- * Also check for enough sockets. FreeBSD users should check the
- * net.inet.ip.portrange.last sysctl setting. (I've changed my
- * setting to 40000)
- *
- */
- fd = 10000;
- max_read = 4096;
- timeout = 12;
- /*
- *
- * To set up a target for your own, you can simply
- * add the following line to your /etc/services:
- *
- * bopm 11111/tcp
- *
- * and then add the following line to your /etc/inetd.conf
- *
- * bopm stream tcp nowait nobody /bin/echo echo Proxy Check
- *
- * of course you can change the port and the string to
- * whatever you want
- *
- */
- target_ip = "142.44.247.41";
- target_port = 6667;
- target_string = "Proxy Check";
- };
- user {
- mask = "*!*@*";
- scanner = "default";
- };
- exempt {
- mask = "*!*@127.0.0.1";
- mask = "*!*@255.255.255.255";
- mask = "*!*@192.99.188.233";
- mask = "*!*@149.56.157.142";
- mask = "*!*@158.69.11.194";
- mask = "*!*@192.95.22.115";
- mask = "*!*@192.95.17.78";
- mask = "*!*@158.69.5.49";
- mask = "*!*@158.69.5.50";
- mask = "*!*@167.114.34.245";
- };
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement