Техническая информация
- 3va37487mgnsanc4chvbhkwc2su5
- /bin/sh -c nft add rule ip filter input tcp dport 59666 drop
- /sbin/xtables-multi iptables -A INPUT -p udp --dport 37215 -j DROP
- /sbin/xtables-multi iptables -A INPUT -p udp --dport 59666 -j DROP
- /bin/sh -c iptables -A INPUT -p tcp --dport 37215 -j DROP
- /bin/kmod /sbin/modprobe ip_tables
- /bin/sh -c nft add rule ip filter input udp dport 37215 drop
- /bin/sh -c iptables -A INPUT -p udp --dport 37215 -j DROP
- busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
- /sbin/xtables-multi iptables -A INPUT -p tcp --dport 37215 -j DROP
- /bin/sh -c busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
- /bin/sh -c iptables -A INPUT -p udp --dport 59666 -j DROP
- /bin/sh -c /usr/bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
- /sbin/xtables-multi iptables -A INPUT -p tcp --dport 59666 -j DROP
- /sbin/xtables-multi iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
- /bin/sh -c echo \x22127.0.0.1 reachedfucktheccp.top\x22 >> /etc/hosts
- /sbin/xtables-multi iptables -A INPUT -s 141.98.10.128 -j DROP
- /bin/sh -c ufw deny 37215/tcp
- /bin/sh -c ufw deny 37215/udp
- /bin/sh -c /bin/iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
- /bin/sh -c nft add rule ip filter input tcp dport 37215 drop
- /bin/sh -c iptables -A INPUT -p tcp --dport 59666 -j DROP
- /bin/sh -c /bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
- /bin/sh -c iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
- /bin/busybox iptables -A INPUT -p tcp --dport 26721 -j ACCEPT
- /bin/sh -c nft add rule ip filter input udp dport 59666 drop
- /bin/sh -c iptables -A INPUT -s 141.98.10.128 -j DROP
- /bin/sh -c echo \x22127.0.0.1 fucktheccp.top\x22 >> /etc/hosts
- /xconsole
- /etc/hosts
- /xconsole
- 127.0.0.1:8345
- 0.0.0.0:26721
- 0.0.0.0:55055
- 8.#.8.8:53
- [:##]:37215
- 127.0.0.1:37215
- [:##]:59666
- 127.0.0.1:59666
- 81.###.136.222:53
- 19#.###.175.20:35342
- 21#.##.225.15:37900
- re###thltd.com
- 19#.###.175.20:35342
- 21#.##.225.15:37900
- 19#.###.175.20:35342