File: ipaccess

package info (click to toggle)
nmap 7.40-1
  • links: PTS, VCS
  • area: main
  • in suites: stretch
  • size: 50,080 kB
  • ctags: 26,777
  • sloc: ansic: 98,862; cpp: 64,063; python: 17,751; sh: 14,584; xml: 11,448; makefile: 2,635; perl: 2,585; yacc: 660; lex: 457; asm: 372; java: 45; objc: 43
file content (23 lines) | stat: -rw-r--r-- 504 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
#
# This is a sample IP access list that
# could potentially be used with Ncat
# to allow or deny specific users from
# connecting to an Ncat process, such as
# a standard listen operation to being
# able to access your newly spawned SOCKS4
# server.
#
# Obviously, these IP addresses are pretty 
# useless to most people. It is an example
# afterall. :)
#
# Chris Gibson, <chris@linuxops.net>

# lo interface.
127.0.0.1/8

# eth0 internal network.
192.168.0.0/24

# eth1 to outside world.
55.20.30.1/32