<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to block multiple ips with iptables in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341543#M86136</link>
    <description>You seem to be trying to drop a class A address 4.x.x.x&lt;BR /&gt;&lt;BR /&gt;$IPT -A INPUT -p ALL -s 4.0.0.0/8 -j DROP&lt;BR /&gt;&lt;BR /&gt;$IPT -A INPUT -p ALL -s 4.0.0.0/24 -j DROP&lt;BR /&gt;&lt;BR /&gt;I would on initial inspection think you are not  blocking the entire ip range due to that last number after the slash.&lt;BR /&gt;&lt;BR /&gt;Can you tell me how you calculated an 8 would do it for you, then I can try and tell you what the number should be in my estimation.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
    <pubDate>Mon, 26 Jul 2004 18:39:18 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2004-07-26T18:39:18Z</dc:date>
    <item>
      <title>How to block multiple ips with iptables</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341542#M86135</link>
      <description>I have this in my iptables:&lt;BR /&gt;&lt;BR /&gt;# Drop everyting from the following ip's&lt;BR /&gt;echo "Process the bad people ..."&lt;BR /&gt;$IPT -A INPUT -p ALL -s 68.122.142.182 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 68.144.185.86 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 68.157.86.130 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 216.185.55.67 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 68.210.138.17 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 62.81.176.46 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 221.142.197.203 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 207.250.236.66 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 220.120.103.188 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 68.47.18.119 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 12.219.16.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.9.205.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.10.212.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.10.222.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.11.170.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.11.94.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.14.31.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.17.245.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.17.252.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.18.150.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.190.183.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 64.108.112.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 66.131.24.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 67.126.223.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 67.161.203.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 67.162.171.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 67.165.189.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 67.173.10.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 68.117.2.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 193.109.140.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 4.0.0.0/8 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.82.81.169 -j DROP&lt;BR /&gt;&lt;BR /&gt;Yet, I see these in my logwatch:&lt;BR /&gt;&lt;BR /&gt;Logged 3931 packets on interface eth0&lt;BR /&gt;   From 4.7.19.183 - 2 packets&lt;BR /&gt;      To &lt;A href="http://WWW.XXX.YYY.ZZZ" target="_blank"&gt;WWW.XXX.YYY.ZZZ&lt;/A&gt; - 2 packets&lt;BR /&gt;         Service: 135 (tcp/135) (INPUT packet died:,eth0,none) - 2 packets&lt;BR /&gt;   From 4.7.235.134 - 2 packets&lt;BR /&gt;      To &lt;A href="http://WWW.XXX.YYY.ZZZ" target="_blank"&gt;WWW.XXX.YYY.ZZZ&lt;/A&gt; - 2 packets&lt;BR /&gt;         Service: http (tcp/80) (New not syn:,eth0,none) - 2 packets&lt;BR /&gt;   From 4.13.50.245 - 1 packet&lt;BR /&gt;      To &lt;A href="http://WWW.XXX.YYY.ZZZ" target="_blank"&gt;WWW.XXX.YYY.ZZZ&lt;/A&gt; - 1 packet&lt;BR /&gt;         Service: microsoft-ds (tcp/445) (INPUT packet died:,eth0,none) - 1 packet&lt;BR /&gt;   From 4.26.83.64 - 3 packets&lt;BR /&gt;      To &lt;A href="http://WWW.XXX.YYY.ZZZ" target="_blank"&gt;WWW.XXX.YYY.ZZZ&lt;/A&gt; - 3 packets&lt;BR /&gt;         Service: microsoft-ds (tcp/445) (INPUT packet died:,eth0,none) - 3 packets&lt;BR /&gt;&lt;BR /&gt;Why arn't all the 4.X.X.X dropped?&lt;BR /&gt;&lt;BR /&gt;Rgds...Geoff&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 26 Jul 2004 17:44:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341542#M86135</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2004-07-26T17:44:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to block multiple ips with iptables</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341543#M86136</link>
      <description>You seem to be trying to drop a class A address 4.x.x.x&lt;BR /&gt;&lt;BR /&gt;$IPT -A INPUT -p ALL -s 4.0.0.0/8 -j DROP&lt;BR /&gt;&lt;BR /&gt;$IPT -A INPUT -p ALL -s 4.0.0.0/24 -j DROP&lt;BR /&gt;&lt;BR /&gt;I would on initial inspection think you are not  blocking the entire ip range due to that last number after the slash.&lt;BR /&gt;&lt;BR /&gt;Can you tell me how you calculated an 8 would do it for you, then I can try and tell you what the number should be in my estimation.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 26 Jul 2004 18:39:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341543#M86136</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-07-26T18:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to block multiple ips with iptables</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341544#M86137</link>
      <description>Nah, his rule is right SEP.&lt;BR /&gt;&lt;BR /&gt;4 octets of 8 bits, first byte full match is an 8 bit netmask.  so 4.0.0.0/8 matches all 4.*.*.* values.&lt;BR /&gt;&lt;BR /&gt;Now, that being the case, the questions that need to be asked are these:&lt;BR /&gt;&lt;BR /&gt;is '&lt;A href="http://WWW.XXX.YYY.ZZZ'" target="_blank"&gt;WWW.XXX.YYY.ZZZ'&lt;/A&gt; the IP address on the interface 'eth0'?&lt;BR /&gt;Or is it another machine using this box as a gateway?&lt;BR /&gt;&lt;BR /&gt;If it's the first, then whilst your rule appears correct, we need to make sure it actually went into your iptables properly.  Verify the current tables by using:&lt;BR /&gt;&lt;BR /&gt;iptables -nvL INPUT&lt;BR /&gt;&lt;BR /&gt;Ensure that there's nothing accepting above it, and that the rule looks correct (i.e.:&lt;BR /&gt;&lt;BR /&gt;312 3982 DROP all -- * * 4.0.0.0/8 0.0.0.0/0          &lt;BR /&gt;&lt;BR /&gt;(the first two numbers being packets/bytes matching the rule)).&lt;BR /&gt;&lt;BR /&gt;If the second, this and possibly other rules would probably be more suited to the FORWARD chain.&lt;BR /&gt;&lt;BR /&gt;In any case, this is why I like DROP policy INPUT/FORWARD chains in IPTables, along with '-m state --state ESTABLISHED,RELATED' rules.  Much goodness.</description>
      <pubDate>Mon, 26 Jul 2004 18:58:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341544#M86137</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2004-07-26T18:58:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to block multiple ips with iptables</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341545#M86138</link>
      <description>Here's the result:&lt;BR /&gt;&lt;BR /&gt;# iptables -nvL INPUT&lt;BR /&gt;Chain INPUT (policy DROP 9733 packets, 726K bytes)&lt;BR /&gt; pkts bytes target     prot opt in     out     source               destination&lt;BR /&gt; 128K   16M ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0&lt;BR /&gt;1225K  160M bad_packets  all  --  *      *       0.0.0.0/0            0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       0.0.0.0/0            224.0.0.1&lt;BR /&gt;    0     0 DROP       all  --  *      *       68.122.142.182       0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       68.144.185.86        0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       68.157.86.130        0.0.0.0/0&lt;BR /&gt;   77  3080 DROP       all  --  *      *       216.185.55.67        0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       68.210.138.17        0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       62.81.176.46         0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       221.142.197.203      0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       207.250.236.66       0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       220.120.103.188      0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       68.47.18.119         0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       12.219.16.0/24       0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       24.9.205.0/24        0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       24.10.212.0/24       0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       24.10.222.0/24       0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       24.11.170.0/24       0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       24.11.94.0/24        0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       24.14.31.0/24        0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       24.17.245.0/24       0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       24.17.252.0/24       0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       24.18.150.0/24       0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       24.190.183.0/24      0.0.0.0/0&lt;BR /&gt;    2    96 DROP       all  --  *      *       64.108.112.0/24      0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       66.131.24.0/24       0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       67.126.223.0/24      0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       67.161.203.0/24      0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       67.162.171.0/24      0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       67.165.189.0/24      0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       67.173.10.0/24       0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       68.117.2.0/24        0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       193.109.140.0/24     0.0.0.0/0&lt;BR /&gt; 5558  345K DROP       all  --  *      *       4.0.0.0/8            0.0.0.0/0&lt;BR /&gt;    0     0 DROP       all  --  *      *       24.82.81.169         0.0.0.0/0&lt;BR /&gt;1146K  155M ACCEPT     all  --  eth0   *       0.0.0.0/0            0.0.0.0/0          state RELATED,ESTABLISHED&lt;BR /&gt;24567 1206K tcp_inbound  tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0&lt;BR /&gt;47190 3866K udp_inbound  udp  --  eth0   *       0.0.0.0/0            0.0.0.0/0&lt;BR /&gt;    0     0 icmp_packets  icmp --  eth0   *       0.0.0.0/0            0.0.0.0/0&lt;BR /&gt;    4   336 DROP       all  --  *      *       0.0.0.0/0            255.255.255.255&lt;BR /&gt; 4539  359K LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0          limit: avg 3/min burst 3 LOG flags 0 level 4 prefix `INPUT packet died: '&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I got the subnet from the following table:&lt;BR /&gt;&lt;BR /&gt;#       class A         xxx.0.0.0/8             255.0.0.0&lt;BR /&gt;#       class B         xxx.xxx.0.0/16          255.255.0.0&lt;BR /&gt;#       class C         xxx.xxx.xxx.0/24        255.255.255.0&lt;BR /&gt;#       128 subnet      xxx.xxx.xxx.xxx/25      255.255.255.128&lt;BR /&gt;#        64 subnet      xxx.xxx.xxx.xxx/26      255.255.255.192&lt;BR /&gt;#        32 subnet      xxx.xxx.xxx.xxx/27      255.255.255.224&lt;BR /&gt;#        16 subnet      xxx.xxx.xxx.xxx/28      255.255.255.240&lt;BR /&gt;#         8 subnet      xxx.xxx.xxx.xxx/29      255.255.255.248&lt;BR /&gt;#         4 subnet      xxx.xxx.xxx.xxx/30      255.255.255.252&lt;BR /&gt;#         2 subnet      xxx.xxx.xxx.xxx/31      255.255.255.254&lt;BR /&gt;#       single address  xxx.xxx.xxx.xxx/32      255.255.255.255&lt;BR /&gt;&lt;BR /&gt;And yes &lt;A href="http://WWW.XXX.YYY.ZZZ" target="_blank"&gt;WWW.XXX.YYY.ZZZ&lt;/A&gt; is my eth0, primary interface.&lt;BR /&gt;&lt;BR /&gt;Rgds...Geoff</description>
      <pubDate>Mon, 26 Jul 2004 21:19:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341545#M86138</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2004-07-26T21:19:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to block multiple ips with iptables</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341546#M86139</link>
      <description>Well that looks good.  THe tell-tail rule of course being:&lt;BR /&gt;&lt;BR /&gt;5558 345K DROP all -- * * 4.0.0.0/8 0.0.0.0/0&lt;BR /&gt;&lt;BR /&gt;It looks as if it's been hit a bit too.&lt;BR /&gt;&lt;BR /&gt;I guess the next thing we need is for you to run a tcpdump to get some more details of the packets.&lt;BR /&gt;&lt;BR /&gt;Please note that whilst you tell them to DROP, the interface will still see them.&lt;BR /&gt;&lt;BR /&gt;So, the output of something like this:&lt;BR /&gt;&lt;BR /&gt;tcpdump -ni eth0 net 4.0.0.0/8&lt;BR /&gt;&lt;BR /&gt;And see what we get.  My guess is you're seeing a few come in the interface, get dropped, and not go anywhere else.</description>
      <pubDate>Tue, 27 Jul 2004 00:12:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341546#M86139</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2004-07-27T00:12:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to block multiple ips with iptables</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341547#M86140</link>
      <description>Yes - &lt;BR /&gt;&lt;BR /&gt;# tcpdump -ni eth0 net 4.0.0.0/8&lt;BR /&gt;tcpdump: listening on eth0&lt;BR /&gt;05:49:47.041859 4.26.26.161.3271 &amp;gt; 64.114.228.15.microsoft-ds: . ack 3759970961 win 0&lt;BR /&gt;05:50:00.567311 4.27.208.9.3298 &amp;gt; 64.114.229.155.microsoft-ds: S 2489455283:2489455283(0) win 64240 &lt;MSS 1460=""&gt; (DF)&lt;BR /&gt;05:50:00.567527 64.114.229.155.microsoft-ds &amp;gt; 4.27.208.9.3298: R 0:0(0) ack 2489455284 win 0&lt;BR /&gt;05:50:02.324703 4.27.208.9.3298 &amp;gt; 64.114.229.155.microsoft-ds: S 2489455283:2489455283(0) win 64240 &lt;MSS 1460=""&gt; (DF)&lt;BR /&gt;05:50:02.325094 64.114.229.155.microsoft-ds &amp;gt; 4.27.208.9.3298: R 0:0(0) ack 1 win 0&lt;BR /&gt;05:50:04.087342 4.27.208.9.3298 &amp;gt; 64.114.229.155.microsoft-ds: S 2489455283:2489455283(0) win 64240 &lt;MSS 1460=""&gt; (DF)&lt;BR /&gt;05:50:04.087584 64.114.229.155.microsoft-ds &amp;gt; 4.27.208.9.3298: R 0:0(0) ack 1 win 0&lt;BR /&gt;05:50:08.916945 4.227.20.243.4161 &amp;gt; 64.114.228.115.microsoft-ds: S 2682269997:2682269997(0) win 8760 &lt;MSS 1460=""&gt; (DF)&lt;BR /&gt;05:50:08.917233 64.114.228.115.microsoft-ds &amp;gt; 4.227.20.243.4161: S 3780647258:3780647258(0) ack 2682269998 win 65535 &lt;MSS 1460=""&gt; (DF)&lt;BR /&gt;05:50:11.451857 4.227.20.243.4161 &amp;gt; 64.114.228.115.microsoft-ds: . ack 1 win 8760 (DF)&lt;BR /&gt;05:50:13.347482 4.227.20.243.4161 &amp;gt; 64.114.228.115.microsoft-ds: P 1:138(137) ack 1 win 8760 (DF)&lt;BR /&gt;05:50:13.347829 64.114.228.115.microsoft-ds &amp;gt; 4.227.20.243.4161: P 1:90(89) ack 138 win 65398 (DF)&lt;BR /&gt;05:50:13.372927 4.26.220.237.1140 &amp;gt; 64.114.228.132.microsoft-ds: S 3613026315:3613026315(0) win 64240 &lt;MSS 1460=""&gt; (DF)&lt;BR /&gt;05:50:13.373147 64.114.228.132.microsoft-ds &amp;gt; 4.26.220.237.1140: S 3782272418:3782272418(0) ack 3613026316 win 65535 &lt;MSS 1460=""&gt; (DF)&lt;BR /&gt;05:50:13.422068 4.26.220.237.1140 &amp;gt; 64.114.228.132.microsoft-ds: . ack 1 win 64240 (DF)&lt;BR /&gt;05:50:13.626374 4.26.220.237.1140 &amp;gt; 64.114.228.132.microsoft-ds: P 1:138(137) ack 1 win 64240 (DF)&lt;BR /&gt;05:50:13.626997 64.114.228.132.microsoft-ds &amp;gt; 4.26.220.237.1140: P 1:90(89) ack 138 win 65398 (DF)&lt;BR /&gt;05:50:13.830065 4.26.220.237.1140 &amp;gt; 64.114.228.132.microsoft-ds: . ack 90 win 64151 (DF)&lt;BR /&gt;05:50:13.836485 4.26.220.237.1140 &amp;gt; 64.114.228.132.microsoft-ds: P 138:306(168) ack 90 win 64151 (DF)&lt;BR /&gt;05:50:13.837041 64.114.228.132.microsoft-ds &amp;gt; 4.26.220.237.1140: P 90:347(257) ack 306 win 65230 (DF)&lt;BR /&gt;05:50:14.034966 4.26.220.237.1140 &amp;gt; 64.114.228.132.microsoft-ds: P 306:528(222) ack 347 win 63894 (DF)&lt;BR /&gt;05:50:14.035192 64.114.228.132.microsoft-ds &amp;gt; 4.26.220.237.1140: P 347:386(39) ack 528 win 65008 (DF)&lt;BR /&gt;05:50:14.231262 4.26.220.237.1140 &amp;gt; 64.114.228.132.microsoft-ds: F 528:528(0) ack 386 win 63855 (DF)&lt;BR /&gt;05:50:14.231530 64.114.228.132.microsoft-ds &amp;gt; 4.26.220.237.1140: F 386:386(0) ack 529 win 65008 (DF)&lt;BR /&gt;05:50:14.278521 4.26.220.237.1140 &amp;gt; 64.114.228.132.microsoft-ds: . ack 387 win 63855 (DF)&lt;BR /&gt;05:50:16.583238 64.114.228.115.microsoft-ds &amp;gt; 4.227.20.243.4161: P 1:90(89) ack 138 win 65398 (DF)&lt;BR /&gt;05:50:23.146162 64.114.228.115.microsoft-ds &amp;gt; 4.227.20.243.4161: P 1:90(89) ack 138 win 65398 (DF)&lt;BR /&gt;05:50:36.272011 64.114.228.115.microsoft-ds &amp;gt; 4.227.20.243.4161: P 1:90(89) ack 138 win 65398 (DF)&lt;BR /&gt;05:50:36.958348 4.227.20.243.4161 &amp;gt; 64.114.228.115.microsoft-ds: P 138:306(168) ack 90 win 8671 (DF)&lt;BR /&gt;05:50:36.958912 64.114.228.115.microsoft-ds &amp;gt; 4.227.20.243.4161: P 90:347(257) ack 306 win 65230 (DF)&lt;BR /&gt;&lt;BR /&gt;36 packets received by filter&lt;BR /&gt;0 packets dropped by kernel&lt;BR /&gt;&lt;BR /&gt;Stuart, so, my iptables is working - they just still hit the interface - and therefore are also logged by logwatch - but nothing to worry about.&lt;BR /&gt;&lt;BR /&gt;Is that correct?&lt;BR /&gt;&lt;BR /&gt;Thanks...Geoff&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;</description>
      <pubDate>Tue, 27 Jul 2004 07:47:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341547#M86140</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2004-07-27T07:47:21Z</dc:date>
    </item>
    <item>
      <title>Re: How to block multiple ips with iptables</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341548#M86141</link>
      <description>Thanks Stuart for the correction.&lt;BR /&gt;&lt;BR /&gt;After reading this all, I'm in the camp that the packets are being dropped but are still showing up in the logs.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 27 Jul 2004 09:40:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341548#M86141</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-07-27T09:40:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to block multiple ips with iptables</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341549#M86142</link>
      <description>This is concerning:&lt;BR /&gt;&lt;BR /&gt;This packet *should* be dropped:&lt;BR /&gt;&lt;BR /&gt;05:50:36.958348 4.227.20.243.4161 &amp;gt; 64.114.228.115.microsoft-ds: P 138:306(168) ack 90 win 8671 (DF)&lt;BR /&gt;&lt;BR /&gt;Which would mean that 64.114.228.115 shouldn't be responding on the microsft-ds port, as the following lines show it is:&lt;BR /&gt;&lt;BR /&gt;05:50:16.583238 64.114.228.115.microsoft-ds &amp;gt; 4.227.20.243.4161: P 1:90(89) ack 138 win 65398 (DF)&lt;BR /&gt;05:50:23.146162 64.114.228.115.microsoft-ds &amp;gt; 4.227.20.243.4161: P 1:90(89) ack 138 win 65398 (DF)&lt;BR /&gt;05:50:36.272011 64.114.228.115.microsoft-ds &amp;gt; 4.227.20.243.4161: P 1:90(89) ack 138 win 65398 (DF)&lt;BR /&gt;&lt;BR /&gt;Which is bad.  Now, I'm assuming 64.114.228.115 is the IP on 'eth0'?&lt;BR /&gt;&lt;BR /&gt;Then it means that a machine behind the linux box (which is being SNAT/MASQUERADE'd) initiated the connection to the external box on the 4.0.0.0/8 subnet, which is then being allowed to continue communicating due to an '-m state --state ESTABLISHED,RELATED' in your FORWARD chain.</description>
      <pubDate>Tue, 27 Jul 2004 18:38:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341549#M86142</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2004-07-27T18:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to block multiple ips with iptables</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341550#M86143</link>
      <description>64.114.228.115 is a Windoze machine at the ISP my server is at - not my eth0.&lt;BR /&gt;&lt;BR /&gt;Rgds...Geoff&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Jul 2004 19:00:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-to-block-multiple-ips-with-iptables/m-p/3341550#M86143</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2004-07-27T19:00:32Z</dc:date>
    </item>
  </channel>
</rss>

