Guest User

Untitled

a guest
Nov 16th, 2018
90
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.92 KB | None | 0 0
  1. -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
  2. -A INPUT -p tcp -m multiport --dports 80,443 -m recent --update --seconds 3600 --name BANNED --rsource -j DROP
  3. -A INPUT -p tcp -m multiport --dports 80,443 -m state --state NEW -j ATTK_CHECK
  4.  
  5. -A ATTACKED -m limit --limit 5/min -j LOG --log-prefix "IPTABLES (Rule ATTACKED): " --log-level 7
  6. -A ATTACKED -m recent --set --name BANNED --rsource -j DROP
  7. -A ATTK_CHECK -m recent --set --name ATTK –-rsource
  8. -A ATTK_CHECK -m recent --update --seconds 600 --hitcount 150 --name ATTK --rsource -j ATTACKED
  9. -A ATTK_CHECK -m recent --update --seconds 60 --hitcount 50 --name ATTK --rsource -j ATTACKED
  10. -A ATTK_CHECK -j ACCEPT
  11.  
  12. ip route add blackhole $IP_HERE
  13. ip route flush cache
  14.  
  15. iptables -A INPUT -p tcp --dport 80 -m hashlimit --hashlimit-upto 50/min
  16. --hashlimit-burst 500 --hashlimit-mode srcip --hashlimit-name http -j ACCEPT
  17. iptables -A INPUT -p tcp --dport 80 -j DROP
Add Comment
Please, Sign In to add comment