66 lines
2.2 KiB
Bash
66 lines
2.2 KiB
Bash
|
#!/bin/bash
|
|||
|
#
|
|||
|
# Debian Stretch.
|
|||
|
# System authorization information.
|
|||
|
# Author: aixiao
|
|||
|
# Email: aixiao@aixiao.me
|
|||
|
# Date: 20170909
|
|||
|
# Modify Time: 171125
|
|||
|
#
|
|||
|
|
|||
|
pwd_path=/root
|
|||
|
TIME=`date +"%Y%m%d"`
|
|||
|
log_file=${pwd_path}/${TIME}.log
|
|||
|
|
|||
|
echo "Read-Only Memory,ROM:" &>> ${log_file}
|
|||
|
df -am &>> ${log_file}
|
|||
|
|
|||
|
echo "" &>> ${log_file}
|
|||
|
echo "random access memory,RAM:" &>> ${log_file}
|
|||
|
free -hl &>> ${log_file}
|
|||
|
|
|||
|
echo "" &>> ${log_file}
|
|||
|
echo "System process:" &>> ${log_file}
|
|||
|
ps -axjf &>> ${log_file}
|
|||
|
|
|||
|
echo "" &>> ${log_file}
|
|||
|
echo "Network Connections" &>> ${log_file}
|
|||
|
netstat -tnulp &>> ${log_file}
|
|||
|
|
|||
|
echo "" &>> ${log_file}
|
|||
|
echo "AIC" &>> ${log_file}
|
|||
|
netstat -ntu &>> ${log_file}
|
|||
|
|
|||
|
echo "" &>> ${log_file}
|
|||
|
echo "System authorization information:" &>> ${log_file}
|
|||
|
if test "`date | awk '{print $3}'`" -ge 10 ; then
|
|||
|
grep ^`date | awk '{print $2}'`.`date | awk '{print $3}'` /var/log/auth.log &>> ${log_file}
|
|||
|
grep -E "^`date | awk '{print $2}'`.`date | awk '{print $3}'`" /var/log/auth.log | grep failure | grep rhost | awk '{printf $14 "\n"}' | cut -d = -f 2 | awk '{a[$1]+=1;} END {for(i in a){print a[i]" "i;}}' &>> ${log_file}
|
|||
|
|
|||
|
ip=$(grep -E "^`date | awk '{print $2}'`.`date | awk '{print $3}'`" /var/log/auth.log | grep failure | grep rhost | awk '{printf $14 "\n"}' | cut -d = -f 2 | awk '{a[$1]+=1;} END {for(i in a){if (a[i] >= 9) {print i;}}}')
|
|||
|
else
|
|||
|
grep ^`date | awk '{print $2}'`..`date | awk '{print $3}'` /var/log/auth.log &>> ${log_file}
|
|||
|
grep -E "^`date | awk '{print $2}'`..`date | awk '{print $3}'`" /var/log/auth.log | grep failure | grep rhost | awk '{printf $14 "\n"}' | cut -d = -f 2 | awk '{a[$1]+=1;} END {for(i in a){print a[i]" "i;}}' &>> ${log_file}
|
|||
|
|
|||
|
ip=$(grep -E "^`date | awk '{print $2}'`..`date | awk '{print $3}'`" /var/log/auth.log | grep failure | grep rhost | awk '{printf $14 "\n"}' | cut -d = -f 2 | awk '{a[$1]+=1;} END {for(i in a){if (a[i] >= 9) {print i;}}}')
|
|||
|
fi
|
|||
|
|
|||
|
ip_add=($ip)
|
|||
|
for i in ${ip_add[@]} ; do
|
|||
|
/sbin/iptables -I INPUT -s $i -j DROP
|
|||
|
done
|
|||
|
/sbin/iptables-save > /root/ipv4tables
|
|||
|
|
|||
|
echo "" &>> ${log_file}
|
|||
|
echo "Iptables filter table" &>> ${log_file}
|
|||
|
/sbin/iptables -L -n --line-numbers &>> ${log_file}
|
|||
|
echo "" &>> ${log_file}
|
|||
|
|
|||
|
mail -s "System Log" 1605227279@qq.com < ${log_file}
|
|||
|
rm ${log_file}
|
|||
|
sync
|
|||
|
sync
|
|||
|
exit
|
|||
|
aixiao@aixiao.me
|
|||
|
|