Iptables
example
# Generated by iptables-save v1.8.10 (nf_tables) on Mon Sep 16 12:03:49 2024 *filter :INPUT DROP [3:140] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [0:0] :SSHATTACK - [0:0] -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT -A INPUT -i lo -j ACCEPT -A INPUT -p tcp -m multiport --dports 25,143,587,465,993,995,80,443,1022 -j ACCEPT -A INPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT -A INPUT -s 84.246.166.0/24,77.48.10.155,188.245.103.82,46.234.105.145/32,46.234.105.154/32 -p tcp -m tcp --dport 22201 -j ACCEPT #-A INPUT -i eth0 -p tcp -m state --dport 22201 --state NEW -m recent --set #-A INPUT -i eth0 -p tcp -m state --dport 22201 --state NEW -m recent --update --seconds 1200 --hitcount 2 -j SSHATTACK -A INPUT -s 84.246.166.0/24 -p tcp -m tcp --dport 6556 -j ACCEPT -A INPUT -s 77.48.10.155/32 -p tcp -m tcp --dport 6556 -j ACCEPT -A INPUT -s 84.246.166.0/24 -p tcp -m multiport --dports 443,80 -j ACCEPT -A INPUT -s 77.48.10.155/32 -p tcp -m multiport --dports 443,80 -j ACCEPT -A INPUT -s 46.234.105.145/32 -p tcp -m multiport --dports 443,80 -j ACCEPT -A INPUT -s 84.246.166.0/24 -p tcp -m tcp --dport 9000 -j ACCEPT -A INPUT -s 77.48.10.155/32 -p tcp -m tcp --dport 9000 -j ACCEPT -A INPUT -s 46.234.105.145/32 -p tcp -m tcp --dport 9000 -j ACCEPT -A INPUT -j LOG -A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT -A OUTPUT -p tcp -m state --state NEW -j ACCEPT -A OUTPUT -p udp -m state --state NEW -j ACCEPT -A OUTPUT -p icmp -m state --state NEW -j ACCEPT -A SSHATTACK -j LOG --log-prefix "Possible SSH attack! " --log-level 7 -A SSHATTACK -j DROP COMMIT # Completed on Mon Sep 16 12:03:49 2024