mirror of
https://github.com/pavel-odintsov/fastnetmon
synced 2024-11-23 13:22:36 +01:00
Fixes in READMER
This commit is contained in:
parent
9c60270a30
commit
6045cd04f6
31
README.md
31
README.md
@ -1,6 +1,8 @@
|
||||
FastNetMon
|
||||
===========
|
||||
Author: [Pavel Odintsov](http://ru.linkedin.com/in/podintsov/) pavel.odintsov at gmail.com [Follow my Twitter](https://twitter.com/odintsov_pavel) [Join to maillist](https://groups.google.com/forum/#!forum/fastnetmon)
|
||||
Author: [Pavel Odintsov](http://ru.linkedin.com/in/podintsov/) pavel.odintsov at gmail.com [Follow my Twitter](https://twitter.com/odintsov_pavel)
|
||||
|
||||
Join to [maillist](https://groups.google.com/forum/#!forum/fastnetmon)
|
||||
|
||||
License: GPLv2
|
||||
|
||||
@ -8,8 +10,6 @@ FastNetMon - A high performance DoS/DDoS load analyzer built on top of multiple
|
||||
|
||||
What can we do? We can detect hosts in our own network with a large amount of packets per second/bytes per second or flow per second incoming or outgoing from certain hosts. And we can call an external script which can notify you, switch off a server or blackhole the client.
|
||||
|
||||
Why did we write this? Because we can't find any software for solving this problem in the open source world!
|
||||
|
||||
- [Binary rpm packages for CentOS 6/7 and Fedora 21](docs/INSTALL_RPM_PACKAGES.md)
|
||||
- [Automatic install script for Debian/Ubuntu/CentOS/Fedora](docs/INSTALL.md)
|
||||
- [Install from FreeBSD port](docs/FreeBSD_INSTALL.md)
|
||||
@ -74,11 +74,6 @@ xx.xx.xx.xx:33611 < 216.239.32.109:53 729021 bytes 5927 packets
|
||||
xx.xx.xx.xx:33611 < 216.239.34.109:53 231609 bytes 1883 packets
|
||||
xx.xx.xx.xx:33611 < 216.239.36.109:53 728652 bytes 5924 packets
|
||||
xx.xx.xx.xx:33611 < 216.239.38.109:53 414387 bytes 3369 packets
|
||||
xx.xx.xx.xx:38458 < 216.239.32.109:53 724347 bytes 5889 packets
|
||||
xx.xx.xx.xx:38458 < 216.239.34.109:53 222753 bytes 1811 packets
|
||||
xx.xx.xx.xx:38458 < 216.239.36.109:53 729267 bytes 5929 packets
|
||||
xx.xx.xx.xx:38458 < 216.239.38.109:53 383514 bytes 3118 packets
|
||||
xx.xx.xx.xx:42279 < 216.239.32.109:53 687201 bytes 5587 packets
|
||||
xx.xx.xx.xx:42279 < 216.239.34.109:53 248091 bytes 2017 packets
|
||||
xx.xx.xx.xx:42279 < 216.239.36.109:53 737508 bytes 5996 packets
|
||||
xx.xx.xx.xx:42279 < 216.239.38.109:53 321276 bytes 2612 packets
|
||||
@ -95,16 +90,6 @@ xx.xx.xx.xx:33611 > 216.239.32.109:53 531309 bytes 6107 packets
|
||||
xx.xx.xx.xx:33611 > 216.239.34.109:53 531222 bytes 6106 packets
|
||||
xx.xx.xx.xx:33611 > 216.239.36.109:53 531222 bytes 6106 packets
|
||||
xx.xx.xx.xx:33611 > 216.239.38.109:53 531222 bytes 6106 packets
|
||||
xx.xx.xx.xx:38458 > 216.239.32.109:53 527220 bytes 6060 packets
|
||||
xx.xx.xx.xx:38458 > 216.239.34.109:53 527133 bytes 6059 packets
|
||||
xx.xx.xx.xx:38458 > 216.239.36.109:53 527133 bytes 6059 packets
|
||||
xx.xx.xx.xx:38458 > 216.239.38.109:53 527220 bytes 6060 packets
|
||||
xx.xx.xx.xx:42279 > 216.239.32.109:53 539052 bytes 6196 packets
|
||||
xx.xx.xx.xx:42279 > 216.239.34.109:53 539052 bytes 6196 packets
|
||||
xx.xx.xx.xx:42279 > 216.239.36.109:53 539139 bytes 6197 packets
|
||||
xx.xx.xx.xx:42279 > 216.239.38.109:53 539139 bytes 6197 packets
|
||||
xx.xx.xx.xx:51469 > 216.239.32.109:53 532701 bytes 6123 packets
|
||||
xx.xx.xx.xx:51469 > 216.239.34.109:53 532701 bytes 6123 packets
|
||||
xx.xx.xx.xx:51469 > 216.239.36.109:53 532701 bytes 6123 packets
|
||||
xx.xx.xx.xx:51469 > 216.239.38.109:53 532788 bytes 6124 packets
|
||||
```
|
||||
@ -120,14 +105,6 @@ IP: xx.zz.xx.1
|
||||
2014-11-21 08:01:11.419837 216.239.38.109:53 > xx.xx.xx.xx:33611 protocol: udp flags: size: 123 bytes
|
||||
2014-11-21 08:01:11.419838 216.239.34.109:53 > xx.xx.xx.xx:33611 protocol: udp flags: size: 123 bytes
|
||||
2014-11-21 08:01:11.419859 216.239.38.109:53 > xx.xx.xx.xx:42279 protocol: udp flags: size: 123 bytes
|
||||
2014-11-21 08:01:11.419877 xx.xx.xx.xx:51469 > 216.239.38.109:53 protocol: udp flags: size: 87 bytes
|
||||
2014-11-21 08:01:11.419884 216.239.38.109:53 > xx.xx.xx.xx:33611 protocol: udp flags: size: 123 bytes
|
||||
2014-11-21 08:01:11.419891 216.239.32.109:53 > xx.xx.xx.xx:38458 protocol: udp flags: size: 123 bytes
|
||||
2014-11-21 08:01:11.419906 216.239.38.109:53 > xx.xx.xx.xx:33611 protocol: udp flags: size: 123 bytes
|
||||
2014-11-21 08:01:11.419907 216.239.38.109:53 > xx.xx.xx.xx:42279 protocol: udp flags: size: 123 bytes
|
||||
2014-11-21 08:01:11.419908 216.239.38.109:53 > xx.xx.xx.xx:42279 protocol: udp flags: size: 123 bytes
|
||||
2014-11-21 08:01:11.419916 216.239.32.109:53 > xx.xx.xx.xx:38458 protocol: udp flags: size: 123 bytes
|
||||
2014-11-21 08:01:11.419917 216.239.32.109:53 > xx.xx.xx.xx:38458 protocol: udp flags: size: 123 bytes
|
||||
2014-11-21 08:01:11.419929 216.239.38.109:53 > xx.xx.xx.xx:33611 protocol: udp flags: size: 123 bytes
|
||||
2014-11-21 08:01:11.419961 216.239.32.109:53 > xx.xx.xx.xx:38458 protocol: udp flags: size: 123 bytes
|
||||
2014-11-21 08:01:11.419962 216.239.32.109:53 > xx.xx.xx.xx:38458 protocol: udp flags: size: 123 bytes
|
||||
@ -138,6 +115,8 @@ IP: xx.zz.xx.1
|
||||
To enable sFLOW simply specify IP of server with installed FastNetMon and specify port 6343.
|
||||
To enable netflow simply specify IP of server with installed FastNetMon and specify port 2055.
|
||||
|
||||
Why did we write this? Because we can't find any software for solving this problem in the open source world!
|
||||
|
||||
How I can help project?
|
||||
- Test it!
|
||||
- Share your experience
|
||||
|
Loading…
Reference in New Issue
Block a user