I rebooted the router and then I ran the function ./IPSET_Block.sh init reset ipset, but that didn't help either.
command line output from IS_B init:
admin@RT-AC3100-0000:/jffs/scripts# ./IPSET_Block.sh init
v4.03 © 2016-2017 Martineau, Dynamic IPSET Blocking.....
IPSET(s) restored from '/mnt/ASUS/IPSET_Logs/IPSET_Block.config'
Restoring permanently banned I/P addresses to Blacklist from '/mnt/ASUS/IPSET_Logs/IPSET_Block.config.add'.....
ipset v6.29: The set with the given name does not exist
ipset v6.29: The set with the given name does not exist
ipset v6.29: The set with the given name does not exist
iptables v1.4.14: Set Blacklist doesn't exist.
Try `iptables -h' or 'iptables --help' for more information.
iptables v1.4.14: Set Whitelist doesn't exist.
Try `iptables -h' or 'iptables --help' for more information.
(IPSET_Block.sh): 12103 **ERROR** Unable to add - INPUT --match-set Whitelist RC=0
iptables v1.4.14: Set Blacklist doesn't exist.
Try `iptables -h' or 'iptables --help' for more information.
iptables v1.4.14: Set Blacklist doesn't exist.
Try `iptables -h' or 'iptables --help' for more information.
Bad argument `58'
Try `iptables -h' or 'iptables --help' for more information.
iptables v1.4.14: Set Whitelist doesn't exist.
Try `iptables -h' or 'iptables --help' for more information.
ipset v6.29: The set with the given name does not exist
***ERROR IPSET Blacklist does not exist! - Please run 'IPSET_Block.sh init'
admin@RT-AC3100-0000:/jffs/scripts#
21:34:44 does seem a strange 'hourly' cron invocation, but you can obviously confirm if it has been physically deleted (rather than the script incorrectly failing) by using:
Code:
ipset list | grep Blacklist | uniq
So if the IPSET has indeed been purged (
how/why?? ), then if there is no
IPSET_Block.config on a persistent USB drive for the
'init' directive to automatically restore from, then you will need to issue:
Code:
./IPSET_Block.sh init reset
Unless there is anything significant logged in Syslog, then it is going to be difficult to determine the cause.
I'm sorry if I gave confusing info. I ran the script from the command line to give you something to let you know what was going on.
I just ran the "init reset" and it appears to have fixed the script.
Here is the output from that run:
admin@RT-AC3100-0000:/jffs/scripts# ./IPSET_Block.sh init reset
v4.03 © 2016-2017 Martineau, Dynamic IPSET Blocking.....
IPSETs: 'Blacklist*/Whitelist*' created empty - reset!
Restoring permanently banned I/P addresses to Blacklist from '/mnt/ASUS/IPSET_Logs/IPSET_Block.config.add'.....
iptables: No chain/target/match by that name.
iptables: No chain/target/match by that name.
Bad argument `59'
Try `iptables -h' or 'iptables --help' for more information.
Summary Blacklist: 0+0 Successful blocks! ( 0 IPs currently banned - 2 added ), Entries auto-expire after 7 days 00:00:00hrs, 2 permanently banned
v2.06 © 2016-2017 Martineau, Hacker Port attacks Report.....
Scanning /tmp/syslog.log for ANY interface (IN=eth0) violations, please wait.....
53 records scanned from Syslog ('/tmp/syslog.log')
07 Jun 07:20:13: # Unique Ports attacked via ANY interface: 2 (out of 3 attempts) tracked via SYSLOG, Jun 7 07:18:36 - Jun 7 07:20:13
Top 3 Ports attacked:
2
http://www.speedguide.net/port.php?port=23 e.g.
https://www.speedguide.net/ip/190.0.47.138
1
http://www.speedguide.net/port.php?port=3389 e.g.
https://www.speedguide.net/ip/109.237.108.143
Top 3 attackers:
1
https://www.speedguide.net/ip/190.0.47.138
1
https://www.speedguide.net/ip/109.237.108.143
Last 3 most recent attackers:
https://www.speedguide.net/ip/190.0.47.138
https://www.speedguide.net/ip/109.237.108.143