Server IP : 111.118.215.189 / Your IP : 216.73.216.162 Web Server : Apache System : Linux md-in-83.webhostbox.net 4.19.286-203.ELK.el7.x86_64 #1 SMP Wed Jun 14 04:33:55 CDT 2023 x86_64 User : a1673wkz ( 2475) PHP Version : 8.2.25 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON Directory (0755) : /proc/self/root/usr/share/doc/nmap-ncat-6.40/examples/ |
[ Home ] | [ C0mmand ] | [ Upload File ] |
---|
# # This is a sample IP access list that # could potentially be used with Ncat # to allow or deny specific users from # connecting to an Ncat process, such as # a standard listen operation to being # able to access your newly spawned SOCKS4 # server. # # Obviously, these IP addresses are pretty # useless to most people. It is an example # afterall. :) # # Chris Gibson, <chris@linuxops.net> # lo interface. 127.0.0.1/8 # eth0 internal network. 192.168.0.0/24 # eth1 to outside world. 55.20.30.1/32