Advertisement
Guest User

Untitled

a guest
Dec 19th, 2017
427
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.18 KB | None | 0 0
  1. /*
  2.  
  3. Basic config for BOPM on EFnet by mofo, based on the sample configuration
  4. Contact bopm@mofo.nl for questions/remarks/errors/suggestions.
  5.  
  6. Last modified: Sat Apr 14 01:57:00 CEST 2007
  7.  
  8. */
  9.  
  10. options {
  11. pidfile = "/home/ircd/bopm/bopm.pid"; /* CHANGE THIS */
  12. dns_fdlimit = 64;
  13. };
  14.  
  15.  
  16. IRC {
  17. /*
  18. *
  19. * The next block is for setting up the irc part.
  20. * You do need to change this
  21. *
  22. */
  23. nick = "ProxyScanner";
  24. realname = "Monitor de Proxys";
  25. username = "Scanner";
  26. server = "irc.somoschat.me";
  27. # password = "secret";
  28. port = 6667;
  29. nickserv = "privmsg nick :identify 8uJi6JBI-scanner";
  30. oper = "ProxyScanner ProxyScanner-scanner";
  31. mode = "+oB +cC";
  32. away = "I'm a reBoT. Your messages will be ignored | Soy un reBoT. Tus mensajes serán ignorados.";
  33. channel {
  34. name = "#Servicios";
  35. # key = "somekey";
  36. invite = "privmsg chan :invite #Servicios";
  37. };
  38.  
  39. connregex = "\\*\\*\\* Notice -- Client connecting.*: ([^ ]+) \\(([^@]+)@([^\\)]+)\\) \\[([0-9\\.]+)\\].*";
  40. # connregex = "\\*\\*\\* .*CONNECT: Client connecting.*: ([^ ]+)!([^@]+)@([^\\)]+) \\(([0-9\\.]+)\\) \\[.*\\]";
  41. # connregex = "\\*\\*\\* CONNECT: Client connecting on port [0-9]+: ([^ ]+)!([^@]+)@([^\\)]+) \\[([0-9\\.]+)\\] \\[.*\\]";
  42.  
  43. /*
  44. *
  45. * %n User's nick
  46. * %u User's username
  47. * %h User's irc hostname
  48. * %i User's IP address
  49. *
  50. */
  51. # kline = "KLINE 1440 *@%h ON * :Open Proxy found on your IP %i . Please check your system and fix it.";
  52. kline = "KLINE *@%h 0 :Proxy abierto se encuentra en su conexión. Por favor, visite www.blitzed.org/proxy?ip%=i para obtener más información";
  53.  
  54. };
  55.  
  56.  
  57. OPM {
  58. /*
  59. *
  60. * Please check the validity of using : signs in the K-line reason. If it is not supported,
  61. * you should change the kline rules below to something without the : sign
  62. *
  63. */
  64. blacklist {
  65. name = "dnsbl.dronebl.org";
  66. type = "A record reply";
  67. reply {
  68. 3 = "IRC Drone";
  69. 4 = "Tor";
  70. 5 = "Bottler";
  71. 6 = "Unknown spambot or drone";
  72. 7 = "DDOS Drone";
  73. 8 = "SOCKS Proxy";
  74. 9 = "HTTP Proxy";
  75. 10 = "ProxyChain";
  76. };
  77. ban_unknown = yes;
  78. kline = "gline +*@%i 30d :Drone Gasite. Daca doriti except la ip pentru Informatii trimite-ti un mail la: contact@romaniachat.ro";
  79. };
  80.  
  81. blacklist {
  82. name = "tor.dnsbl.sectoor.de";
  83. type = "A record reply";
  84. reply {
  85. 1 = "Tor exit server";
  86. };
  87. ban_unknown = yes;
  88. kline = "KLINE *@%h 30d :Tor Proxy. Daca doriti except la ip pentru Informatii trimite-ti un mail la: contact@romaniachat.ro";
  89. };
  90.  
  91.  
  92. blacklist {
  93. name = "ircbl.ahbl.org";
  94. type = "A record reply";
  95. ban_unknown = yes;
  96. reply {
  97. 2 = "Open proxy";
  98. };
  99. kline = "KLINE *@%h 30d :Proxy Gasit. Daca doriti except la ip pentru Informatii trimite-ti un mail la: contact@romaniachat.ro";
  100. };
  101.  
  102.  
  103. blacklist {
  104. name = "rbl.efnet.org";
  105. type = "A record reply";
  106. reply {
  107. 1 = "Open proxy";
  108. 2 = "Trojan spreader";
  109. 3 = "Trojan infected client";
  110. 4 = "TOR exit server";
  111. 5 = "Drones / Flooding";
  112. };
  113. ban_unknown = yes;
  114. kline = "KLINE *@%h 30d :Proxy Gasit. Daca doriti except la ip pentru Informatii trimite-ti un mail la: abuse@somoschat.com";
  115. };
  116.  
  117.  
  118.  
  119. # dnsbl_from = "mybopm@myserver.org";
  120. # dnsbl_to = "bopm@reports.blitzed.org";
  121. # sendmail = "/usr/sbin/sendmail";
  122. };
  123.  
  124.  
  125. scanner {
  126. name="default";
  127.  
  128. /*
  129. *
  130. * The next block of protocols is generated from the
  131. * generated weekly blitzed lists and by a generated
  132. * list of all newly found open proxies via the anal
  133. * scans performed by the XS4ALL BOPM bots.
  134. * The lists reflect the top hits in the period
  135. * from 2007.01.01 - 2007.04.13
  136. *
  137. * If you do not want to scan at all and only check
  138. * via the DNSBL's, you should comment all the
  139. * protocol lines out. I highly recommend you do
  140. * perform scans though. It's 165 in total, but it is
  141. * a good reflection of the most basic scans a
  142. * server should check on.
  143. *
  144. */
  145.  
  146. protocol = ROUTER:23;
  147. protocol = SOCKS4:559;
  148. protocol = HTTPPOST:3128;
  149. protocol = SOCKS4:1080;
  150. protocol = SOCKS5:60088;
  151. protocol = HTTP:8080;
  152. protocol = SOCKS5:1182;
  153. protocol = HTTP:3128;
  154. protocol = HTTPPOST:8080;
  155. protocol = SOCKS4:9999;
  156. protocol = HTTPPOST:80;
  157. protocol = SOCKS5:1080;
  158. protocol = HTTP:63000;
  159. protocol = HTTP:8000;
  160. protocol = HTTPPOST:808;
  161. protocol = HTTP:80;
  162. protocol = HTTPPOST:6588;
  163. protocol = HTTP:6588;
  164. protocol = SOCKS5:3128;
  165. protocol = SOCKS5:10080;
  166. protocol = HTTPPOST:4480;
  167. protocol = SOCKS4:6664;
  168. protocol = SOCKS4:63808;
  169. protocol = HTTP:6667;
  170. protocol = SOCKS4:19991;
  171. protocol = SOCKS4:1098;
  172. protocol = SOCKS4:10000;
  173. protocol = SOCKS4:4471;
  174. protocol = HTTP:65506;
  175. protocol = HTTP:63809;
  176. protocol = SOCKS5:9090;
  177. protocol = HTTP:9090;
  178. protocol = HTTP:6668;
  179. protocol = SOCKS4:58;
  180. protocol = SOCKS5:58;
  181. protocol = SOCKS4:6969;
  182. protocol = WINGATE:23;
  183. protocol = SOCKS5:3380;
  184. protocol = SOCKS4:40;
  185. protocol = SOCKS5:443;
  186. protocol = SOCKS4:8888;
  187. protocol = HTTPPOST:9090;
  188. protocol = HTTP:5490;
  189. protocol = SOCKS4:8080;
  190. protocol = SOCKS5:6969;
  191. protocol = SOCKS4:1026;
  192. protocol = SOCKS4:1025;
  193. protocol = HTTP:8888;
  194. protocol = HTTP:6669;
  195. protocol = HTTP:8090;
  196. protocol = HTTP:808;
  197. protocol = SOCKS5:1029;
  198. protocol = SOCKS4:41080;
  199. protocol = SOCKS5:8020;
  200. protocol = SOCKS5:6000;
  201. protocol = HTTPPOST:8081;
  202. protocol = HTTP:4480;
  203. protocol = SOCKS5:1027;
  204. protocol = SOCKS4:1028;
  205. protocol = HTTP:3332;
  206. protocol = SOCKS5:8888;
  207. protocol = SOCKS5:1028;
  208. protocol = SOCKS4:3330;
  209. protocol = SOCKS4:29992;
  210. protocol = SOCKS4:1234;
  211. protocol = SOCKS4:1029;
  212. protocol = HTTP:5000;
  213. protocol = HTTP:443;
  214. protocol = SOCKS5:1813;
  215. protocol = SOCKS5:1081;
  216. protocol = SOCKS5:1026;
  217. protocol = SOCKS4:1337;
  218. protocol = SOCKS4:1050;
  219. protocol = HTTP:1080;
  220. protocol = SOCKS5:9999;
  221. protocol = SOCKS5:9100;
  222. protocol = SOCKS5:19991;
  223. protocol = SOCKS5:1098;
  224. protocol = SOCKS4:9100;
  225. protocol = SOCKS4:7080;
  226. protocol = SOCKS4:1033;
  227. protocol = HTTP:9000;
  228. protocol = HTTP:5800;
  229. protocol = HTTP:5634;
  230. protocol = HTTP:4471;
  231. protocol = HTTP:3382;
  232. protocol = SOCKS5:1200;
  233. protocol = SOCKS5:1039;
  234. protocol = SOCKS5:1025;
  235. protocol = SOCKS4:8002;
  236. protocol = SOCKS4:6748;
  237. protocol = SOCKS4:44548;
  238. protocol = SOCKS4:3380;
  239. protocol = SOCKS4:32167;
  240. protocol = SOCKS4:2000;
  241. protocol = SOCKS4:1979;
  242. protocol = SOCKS4:12654;
  243. protocol = SOCKS4:11225;
  244. protocol = SOCKS4:1066;
  245. protocol = SOCKS4:1030;
  246. protocol = SOCKS4:1027;
  247. protocol = SOCKS4:10099;
  248. protocol = HTTP:81;
  249. protocol = HTTP:6665;
  250. protocol = HTTP:6664;
  251. protocol = HTTP:6663;
  252. protocol = SOCKS5:8278;
  253. protocol = SOCKS5:6748;
  254. protocol = SOCKS5:4914;
  255. protocol = SOCKS5:4471;
  256. protocol = SOCKS5:29992;
  257. protocol = SOCKS5:17235;
  258. protocol = SOCKS5:1234;
  259. protocol = SOCKS5:1202;
  260. protocol = SOCKS5:1180;
  261. protocol = SOCKS5:1075;
  262. protocol = SOCKS5:1033;
  263. protocol = SOCKS5:10000;
  264. protocol = SOCKS4:8020;
  265. protocol = SOCKS4:4044;
  266. protocol = SOCKS4:3128;
  267. protocol = SOCKS4:3127;
  268. protocol = SOCKS4:28882;
  269. protocol = SOCKS4:24973;
  270. protocol = SOCKS4:21421;
  271. protocol = SOCKS4:1182;
  272. protocol = SOCKS4:1032;
  273. protocol = SOCKS4:10242;
  274. protocol = HTTPPOST:8089;
  275. protocol = HTTP:8082;
  276. protocol = HTTP:6661;
  277. protocol = HTTP:35233;
  278. protocol = HTTP:19991;
  279. protocol = HTTP:1098;
  280. protocol = HTTP:1050;
  281. protocol = SOCKS5:9988;
  282. protocol = SOCKS5:8080;
  283. protocol = SOCKS5:8009;
  284. protocol = SOCKS5:6561;
  285. protocol = SOCKS5:24971;
  286. protocol = SOCKS5:18844;
  287. protocol = SOCKS5:1122;
  288. protocol = SOCKS5:10777;
  289. protocol = SOCKS5:1030;
  290. protocol = SOCKS5:10130;
  291. protocol = SOCKS5:10099;
  292. protocol = SOCKS4:8751;
  293. protocol = SOCKS4:8278;
  294. protocol = SOCKS4:8111;
  295. protocol = SOCKS4:7007;
  296. protocol = SOCKS4:6551;
  297. protocol = SOCKS4:5353;
  298. protocol = SOCKS4:443;
  299. protocol = SOCKS4:43341;
  300. protocol = SOCKS4:3801;
  301. protocol = SOCKS4:2280;
  302. protocol = SOCKS4:1978;
  303. protocol = SOCKS4:1212;
  304. protocol = SOCKS4:1039;
  305. protocol = SOCKS4:1031;
  306. protocol = HTTPPOST:81;
  307. protocol = HTTP:9988;
  308. protocol = HTTP:7868;
  309. protocol = HTTP:7070;
  310. protocol = HTTP:444;
  311. protocol = HTTP:1200;
  312. protocol = HTTP:1039;
  313.  
  314.  
  315.  
  316. vhost = "142.44.247.41";
  317. /*
  318. *
  319. * Note: it is really important to have enough file descriptors
  320. * available to the bopm process.
  321. * Also check for enough sockets. FreeBSD users should check the
  322. * net.inet.ip.portrange.last sysctl setting. (I've changed my
  323. * setting to 40000)
  324. *
  325. */
  326. fd = 10000;
  327. max_read = 4096;
  328. timeout = 12;
  329.  
  330. /*
  331. *
  332. * To set up a target for your own, you can simply
  333. * add the following line to your /etc/services:
  334. *
  335. * bopm 11111/tcp
  336. *
  337. * and then add the following line to your /etc/inetd.conf
  338. *
  339. * bopm stream tcp nowait nobody /bin/echo echo Proxy Check
  340. *
  341. * of course you can change the port and the string to
  342. * whatever you want
  343. *
  344. */
  345.  
  346. target_ip = "142.44.247.41";
  347. target_port = 6667;
  348. target_string = "Proxy Check";
  349. };
  350.  
  351. user {
  352. mask = "*!*@*";
  353. scanner = "default";
  354. };
  355.  
  356. exempt {
  357. mask = "*!*@127.0.0.1";
  358. mask = "*!*@255.255.255.255";
  359. mask = "*!*@192.99.188.233";
  360. mask = "*!*@149.56.157.142";
  361. mask = "*!*@158.69.11.194";
  362. mask = "*!*@192.95.22.115";
  363. mask = "*!*@192.95.17.78";
  364. mask = "*!*@158.69.5.49";
  365. mask = "*!*@158.69.5.50";
  366. mask = "*!*@167.114.34.245";
  367. };
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement