What's new

Skynet Is default firewall good enough?

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Just in case, I'd remove all #'s and spaces... Second, it could just be that one of the lists links no longer works, and that's what's causing the 404? You can run your list through @SomeWhereOverTheRainBow and my Skynet filter validator to see what it's failing on?


Also... as a side-note, I'm pretty sure that skynet has an upper limit on the number of IPs that can be on the blocklist, and don't believe it can exceed 500,000. Just so you're aware.
In some rare instances he could be hitting githubs ratelimit especially if he has been running updates on the skynet numerous times in the past hour. I have been over zealous with updates before, but it took me quite a while to hit the limit.
 
What do you get when you try to run

ping -w3 -c1 raw.githubusercontent.com from the ssh terminal?
PING raw.githubusercontent.com (185.199.111.133): 56 data bytes
64 bytes from 185.199.111.133: seq=0 ttl=61 time=5.910 ms

--- raw.githubusercontent.com ping statistics ---
1 packets transmitted, 1 packets received, 0% packet loss
round-trip min/avg/max = 5.910/5.910/5.910 ms
 
PING raw.githubusercontent.com (185.199.111.133): 56 data bytes
64 bytes from 185.199.111.133: seq=0 ttl=61 time=5.910 ms

--- raw.githubusercontent.com ping statistics ---
1 packets transmitted, 1 packets received, 0% packet loss
round-trip min/avg/max = 5.910/5.910/5.910 ms
So, the 404 error could be related to one of the lists not working like @Viktor Jaep said, or it could also be the ratelimit scenario where githubs API is ratelimiting curls access based on your number download in the past hour.
 
Just in case, I'd remove all #'s and spaces... Second, it could just be that one of the lists links no longer works, and that's what's causing the 404? You can run your list through @SomeWhereOverTheRainBow and my Skynet filter validator to see what it's failing on?


Also... as a side-note, I'm pretty sure that skynet has an upper limit on the number of IPs that can be on the blocklist, and don't believe it can exceed 500,000. Just so you're aware.

Tried it now with 2 lists. Both work. Also in those lists I see # for some comments.
Still have the error 404

Tried it in total 7 times to import the list...
 
Tried it now with 2 lists. Both work. Also in those lists I see # for some comments.
Still have the error 404

Tried it in total 7 times to import the list...
You tried running your lists through the filtervalidator.sh?
 
If I were a betting man, I would bet that this entry is what's causing your problem:

1706984818739.png
 
You tried running your lists through the filtervalidator.sh?
This is the output (with only 2 lines)

Code:
   _____ ____            _   __     ___    __     __         
  / __(_) / /____ ____  | | / /__ _/ (_)__/ /__ _/ /____  ____
 / _// / / __/ -_) __/  | |/ / _ '/ / / _  / _ '/ __/ _ \/ __/
/_/ /_/_/\__/\__/_/     |___/\_,_/_/_/\_,_/\_,_/\__/\___/_/   v0.7
        By @Viktor Jaep and @SomewhereOverTheRainbow

Filter Validator was designed to run through your Skynet filter lists to
determine if all IP addresses fall within their normal ranges. Should any
entries not follow standard IP rules, they will be identified below. NOTE:
Having invalid IPs within these filter sets will cause the Skynet firewall
(prior to v7.3.6) to malfunction due to regex issues that fail to filter
out bad IPs, causing a loss of blocked IPs and ranges.

Please enter a valid filter list URL, or hit <ENTER> to use example below:
Example 1: https://raw.githubusercontent.com/ViktorJp/Skynet/main/filter.list
Example 2: https://raw.githubusercontent.com/jumpsmm7/GeneratedAdblock/master/filter.list

URL: https://raw.githubusercontent.com/poudenes/skynet/main/filter.list

Testing against: https://raw.githubusercontent.com/poudenes/skynet/main/filter.list

[Downloading Filter List]...OK
[Checking Filter List Contents]...OK
[Pre-processing Runtime]: 230 ms or 0.230 sec

--------------------------------------------------------------------------

Checking https://iplists.firehol.org/files/alienvault_reputation.ipset
[Valid] [Entries: 609] [Processing Time: 150 ms or 0.150 sec]

Checking https://iplists.firehol.org/files/bds_atif.ipset
[Valid] [Entries: 2116] [Processing Time: 150 ms or 0.150 sec]

--------------------------------------------------------------------------
[Valid Lists]: 2
[Invalid Lists]: 0
[Total Items Checked]: 2725
[Total Processing Runtime]: 530 ms or 0.530 sec
 
This is the output (with only 2 lines)

Code:
   _____ ____            _   __     ___    __     __        
  / __(_) / /____ ____  | | / /__ _/ (_)__/ /__ _/ /____  ____
 / _// / / __/ -_) __/  | |/ / _ '/ / / _  / _ '/ __/ _ \/ __/
/_/ /_/_/\__/\__/_/     |___/\_,_/_/_/\_,_/\_,_/\__/\___/_/   v0.7
        By @Viktor Jaep and @SomewhereOverTheRainbow

Filter Validator was designed to run through your Skynet filter lists to
determine if all IP addresses fall within their normal ranges. Should any
entries not follow standard IP rules, they will be identified below. NOTE:
Having invalid IPs within these filter sets will cause the Skynet firewall
(prior to v7.3.6) to malfunction due to regex issues that fail to filter
out bad IPs, causing a loss of blocked IPs and ranges.

Please enter a valid filter list URL, or hit <ENTER> to use example below:
Example 1: https://raw.githubusercontent.com/ViktorJp/Skynet/main/filter.list
Example 2: https://raw.githubusercontent.com/jumpsmm7/GeneratedAdblock/master/filter.list

URL: https://raw.githubusercontent.com/poudenes/skynet/main/filter.list

Testing against: https://raw.githubusercontent.com/poudenes/skynet/main/filter.list

[Downloading Filter List]...OK
[Checking Filter List Contents]...OK
[Pre-processing Runtime]: 230 ms or 0.230 sec

--------------------------------------------------------------------------

Checking https://iplists.firehol.org/files/alienvault_reputation.ipset
[Valid] [Entries: 609] [Processing Time: 150 ms or 0.150 sec]

Checking https://iplists.firehol.org/files/bds_atif.ipset
[Valid] [Entries: 2116] [Processing Time: 150 ms or 0.150 sec]

--------------------------------------------------------------------------
[Valid Lists]: 2
[Invalid Lists]: 0
[Total Items Checked]: 2725
[Total Processing Runtime]: 530 ms or 0.530 sec
So you're saying that even with list, with only 2 entries, skynet is still complaining about a 404 error?
 
Yes. I choose 5 Import IP List then 1 Blacklist
Then its also exit the tool and back to command line prompt
That's where you're going wrong...

Use (3) malware blacklist, (2) change filter list, then use your github URL
 
This is the output with all lists

Code:
   _____ ____            _   __     ___    __     __         
  / __(_) / /____ ____  | | / /__ _/ (_)__/ /__ _/ /____  ____
 / _// / / __/ -_) __/  | |/ / _ '/ / / _  / _ '/ __/ _ \/ __/
/_/ /_/_/\__/\__/_/     |___/\_,_/_/_/\_,_/\_,_/\__/\___/_/   v0.7
        By @Viktor Jaep and @SomewhereOverTheRainbow

Filter Validator was designed to run through your Skynet filter lists to
determine if all IP addresses fall within their normal ranges. Should any
entries not follow standard IP rules, they will be identified below. NOTE:
Having invalid IPs within these filter sets will cause the Skynet firewall
(prior to v7.3.6) to malfunction due to regex issues that fail to filter
out bad IPs, causing a loss of blocked IPs and ranges.

Please enter a valid filter list URL, or hit <ENTER> to use example below:
Example 1: https://raw.githubusercontent.com/ViktorJp/Skynet/main/filter.list
Example 2: https://raw.githubusercontent.com/jumpsmm7/GeneratedAdblock/master/filter.list

URL: https://raw.githubusercontent.com/poudenes/skynet/main/filter.list

Testing against: https://raw.githubusercontent.com/poudenes/skynet/main/filter.list

[Downloading Filter List]...OK
[Checking Filter List Contents]...OK
[Pre-processing Runtime]: 90 ms or 0.090 sec

--------------------------------------------------------------------------

Checking https://github.com/firehol/blocklist-ipsets/
[: <html: unknown operand
[Valid] [Entries: 1881] [Processing Time: 740 ms or 0.740 sec]

Checking https://iplists.firehol.org/files/alienvault_reputation.ipset
[Valid] [Entries: 609] [Processing Time: 170 ms or 0.170 sec]

Checking https://iplists.firehol.org/files/bds_atif.ipset
[Valid] [Entries: 2116] [Processing Time: 260 ms or 0.260 sec]

Checking https://iplists.firehol.org/files/bi_any_2_30d.ipset
[Valid] [Entries: 1159] [Processing Time: 200 ms or 0.200 sec]

Checking https://iplists.firehol.org/files/blocklist_net_ua.ipset
[Valid] [Entries: 101429] [Processing Time: 6370 ms or 6.370 sec]

Checking https://iplists.firehol.org/files/botvrij_dst.ipset
[Valid] [Entries: 58] [Processing Time: 150 ms or 0.150 sec]

Checking https://iplists.firehol.org/files/ciarmy.ipset
[Valid] [Entries: 15000] [Processing Time: 1020 ms or 1.020 sec]

Checking https://iplists.firehol.org/files/coinbl_hosts_browser.ipset
[Valid] [Entries: 670] [Processing Time: 190 ms or 0.190 sec]

Checking https://iplists.firehol.org/files/cybercrime.ipset
[Valid] [Entries: 855] [Processing Time: 240 ms or 0.240 sec]

Checking https://iplists.firehol.org/files/dm_tor.ipset
[Valid] [Entries: 5873] [Processing Time: 490 ms or 0.490 sec]

Checking https://iplists.firehol.org/files/dshield.netset
[Valid] [Entries: 19] [Processing Time: 140 ms or 0.140 sec]

Checking https://iplists.firehol.org/files/dyndns_ponmocup.ipset
[Valid] [Entries: 41] [Processing Time: 150 ms or 0.150 sec]

Checking https://iplists.firehol.org/files/et_block.netset
[Valid] [Entries: 1003] [Processing Time: 210 ms or 0.210 sec]

Checking https://iplists.firehol.org/files/et_compromised.ipset
[Valid] [Entries: 614] [Processing Time: 230 ms or 0.230 sec]

Checking https://iplists.firehol.org/files/et_spamhaus.netset
[Valid] [Entries: 973] [Processing Time: 200 ms or 0.200 sec]

Checking https://iplists.firehol.org/files/et_tor.ipset
[Valid] [Entries: 6061] [Processing Time: 560 ms or 0.560 sec]

Checking https://iplists.firehol.org/files/firehol_level1.netset
[Valid] [Entries: 1947] [Processing Time: 360 ms or 0.360 sec]

Checking https://iplists.firehol.org/files/firehol_level2.netset
[Valid] [Entries: 15494] [Processing Time: 1620 ms or 1.620 sec]

Checking https://iplists.firehol.org/files/firehol_level3.netset
[Valid] [Entries: 17124] [Processing Time: 1470 ms or 1.470 sec]

Checking https://iplists.firehol.org/files/greensnow.ipset
[Valid] [Entries: 5824] [Processing Time: 640 ms or 0.640 sec]

Checking https://iplists.firehol.org/files/iblocklist_ciarmy_malicious.netset
[Valid] [Entries: 13100] [Processing Time: 1200 ms or 1.200 sec]

Checking https://iplists.firehol.org/files/iblocklist_pedophiles.netset
[Valid] [Entries: 29188] [Processing Time: 2330 ms or 2.330 sec]

Checking https://iplists.firehol.org/files/malc0de.ipset
[Valid] [Entries: 21] [Processing Time: 140 ms or 0.140 sec]

Checking https://iplists.firehol.org/files/maxmind_proxy_fraud.ipset
[Valid] [Entries: 583] [Processing Time: 170 ms or 0.170 sec]

Checking https://iplists.firehol.org/files/normshield_high_attack.ipset
[Valid] [Entries: 549] [Processing Time: 190 ms or 0.190 sec]

Checking https://iplists.firehol.org/files/normshield_high_bruteforce.ipset
[Valid] [Entries: 196] [Processing Time: 150 ms or 0.150 sec]

Checking https://iplists.firehol.org/files/socks_proxy_1d.ipset
[Valid] [Entries: 3061] [Processing Time: 380 ms or 0.380 sec]

Checking https://iplists.firehol.org/files/spamhaus_drop.netset
[Valid] [Entries: 973] [Processing Time: 210 ms or 0.210 sec]

Checking https://iplists.firehol.org/files/spamhaus_edrop.netset
[Valid] [Entries: 285] [Processing Time: 170 ms or 0.170 sec]

Checking https://iplists.firehol.org/files/sslproxies_1d.ipset
[Valid] [Entries: 207] [Processing Time: 150 ms or 0.150 sec]

Checking https://iplists.firehol.org/files/tor_exits_30d.ipset
[Valid] [Entries: 1142] [Processing Time: 220 ms or 0.220 sec]

Checking https://iplists.firehol.org/files/urlvir.ipset
[Valid] [Entries: 171] [Processing Time: 150 ms or 0.150 sec]

Checking https://raw.githubusercontent.com/SecOps-Institute/Tor-IP-Addresses/master/tor-exit-nodes.lst
[Valid] [Entries: 2169] [Processing Time: 110 ms or 0.110 sec]

Checking https://raw.githubusercontent.com/stamparm/ipsum/master/levels/3.txt
[Valid] [Entries: 18015] [Processing Time: 200 ms or 0.200 sec]

Checking https://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt
[Valid] [Entries: 1033] [Processing Time: 560 ms or 0.560 sec]

Checking https://rules.emergingthreats.net/blockrules/compromised-ips.txt
[Valid] [Entries: 614] [Processing Time: 450 ms or 0.450 sec]

Checking https://sigs.interserver.net/iprbl.txt
[Valid] [Entries: 12225] [Processing Time: 730 ms or 0.730 sec]

Checking https://feodotracker.abuse.ch/downloads/ipblocklist.txt
[Valid] [Entries: 11] [Processing Time: 110 ms or 0.110 sec]

Checking https://sslbl.abuse.ch/blacklist/sslipblacklist.txt
[Valid] [Entries: 47] [Processing Time: 120 ms or 0.120 sec]

Checking https://www.team-cymru.org/Services/Bogons/fullbogons-ipv4.txt
[Valid] [Entries: 686] [Processing Time: 820 ms or 0.820 sec]

Checking https://www.binarydefense.com/banlist.txt
[Valid] [Entries: 2117] [Processing Time: 250 ms or 0.250 sec]

Checking https://cinsscore.com/list/ci-badguys.txt
[Valid] [Entries: 15000] [Processing Time: 1100 ms or 1.100 sec]

Checking https://www.talosintelligence.com/documents/ip-blacklist
[Valid] [Entries: 1618] [Processing Time: 1080 ms or 1.080 sec]

--------------------------------------------------------------------------
[Valid Lists]: 43
[Invalid Lists]: 0
[Total Items Checked]: 281761
[Total Processing Runtime]: 26490 ms or 26.490 sec
 
This is the output with all lists

Code:
   _____ ____            _   __     ___    __     __        
  / __(_) / /____ ____  | | / /__ _/ (_)__/ /__ _/ /____  ____
 / _// / / __/ -_) __/  | |/ / _ '/ / / _  / _ '/ __/ _ \/ __/
/_/ /_/_/\__/\__/_/     |___/\_,_/_/_/\_,_/\_,_/\__/\___/_/   v0.7
        By @Viktor Jaep and @SomewhereOverTheRainbow

Filter Validator was designed to run through your Skynet filter lists to
determine if all IP addresses fall within their normal ranges. Should any
entries not follow standard IP rules, they will be identified below. NOTE:
Having invalid IPs within these filter sets will cause the Skynet firewall
(prior to v7.3.6) to malfunction due to regex issues that fail to filter
out bad IPs, causing a loss of blocked IPs and ranges.

Please enter a valid filter list URL, or hit <ENTER> to use example below:
Example 1: https://raw.githubusercontent.com/ViktorJp/Skynet/main/filter.list
Example 2: https://raw.githubusercontent.com/jumpsmm7/GeneratedAdblock/master/filter.list

URL: https://raw.githubusercontent.com/poudenes/skynet/main/filter.list

Testing against: https://raw.githubusercontent.com/poudenes/skynet/main/filter.list

[Downloading Filter List]...OK
[Checking Filter List Contents]...OK
[Pre-processing Runtime]: 90 ms or 0.090 sec

--------------------------------------------------------------------------

Checking https://github.com/firehol/blocklist-ipsets/
[: <html: unknown operand
[Valid] [Entries: 1881] [Processing Time: 740 ms or 0.740 sec]

Checking https://iplists.firehol.org/files/alienvault_reputation.ipset
[Valid] [Entries: 609] [Processing Time: 170 ms or 0.170 sec]

Checking https://iplists.firehol.org/files/bds_atif.ipset
[Valid] [Entries: 2116] [Processing Time: 260 ms or 0.260 sec]

Checking https://iplists.firehol.org/files/bi_any_2_30d.ipset
[Valid] [Entries: 1159] [Processing Time: 200 ms or 0.200 sec]

Checking https://iplists.firehol.org/files/blocklist_net_ua.ipset
[Valid] [Entries: 101429] [Processing Time: 6370 ms or 6.370 sec]

Checking https://iplists.firehol.org/files/botvrij_dst.ipset
[Valid] [Entries: 58] [Processing Time: 150 ms or 0.150 sec]

Checking https://iplists.firehol.org/files/ciarmy.ipset
[Valid] [Entries: 15000] [Processing Time: 1020 ms or 1.020 sec]

Checking https://iplists.firehol.org/files/coinbl_hosts_browser.ipset
[Valid] [Entries: 670] [Processing Time: 190 ms or 0.190 sec]

Checking https://iplists.firehol.org/files/cybercrime.ipset
[Valid] [Entries: 855] [Processing Time: 240 ms or 0.240 sec]

Checking https://iplists.firehol.org/files/dm_tor.ipset
[Valid] [Entries: 5873] [Processing Time: 490 ms or 0.490 sec]

Checking https://iplists.firehol.org/files/dshield.netset
[Valid] [Entries: 19] [Processing Time: 140 ms or 0.140 sec]

Checking https://iplists.firehol.org/files/dyndns_ponmocup.ipset
[Valid] [Entries: 41] [Processing Time: 150 ms or 0.150 sec]

Checking https://iplists.firehol.org/files/et_block.netset
[Valid] [Entries: 1003] [Processing Time: 210 ms or 0.210 sec]

Checking https://iplists.firehol.org/files/et_compromised.ipset
[Valid] [Entries: 614] [Processing Time: 230 ms or 0.230 sec]

Checking https://iplists.firehol.org/files/et_spamhaus.netset
[Valid] [Entries: 973] [Processing Time: 200 ms or 0.200 sec]

Checking https://iplists.firehol.org/files/et_tor.ipset
[Valid] [Entries: 6061] [Processing Time: 560 ms or 0.560 sec]

Checking https://iplists.firehol.org/files/firehol_level1.netset
[Valid] [Entries: 1947] [Processing Time: 360 ms or 0.360 sec]

Checking https://iplists.firehol.org/files/firehol_level2.netset
[Valid] [Entries: 15494] [Processing Time: 1620 ms or 1.620 sec]

Checking https://iplists.firehol.org/files/firehol_level3.netset
[Valid] [Entries: 17124] [Processing Time: 1470 ms or 1.470 sec]

Checking https://iplists.firehol.org/files/greensnow.ipset
[Valid] [Entries: 5824] [Processing Time: 640 ms or 0.640 sec]

Checking https://iplists.firehol.org/files/iblocklist_ciarmy_malicious.netset
[Valid] [Entries: 13100] [Processing Time: 1200 ms or 1.200 sec]

Checking https://iplists.firehol.org/files/iblocklist_pedophiles.netset
[Valid] [Entries: 29188] [Processing Time: 2330 ms or 2.330 sec]

Checking https://iplists.firehol.org/files/malc0de.ipset
[Valid] [Entries: 21] [Processing Time: 140 ms or 0.140 sec]

Checking https://iplists.firehol.org/files/maxmind_proxy_fraud.ipset
[Valid] [Entries: 583] [Processing Time: 170 ms or 0.170 sec]

Checking https://iplists.firehol.org/files/normshield_high_attack.ipset
[Valid] [Entries: 549] [Processing Time: 190 ms or 0.190 sec]

Checking https://iplists.firehol.org/files/normshield_high_bruteforce.ipset
[Valid] [Entries: 196] [Processing Time: 150 ms or 0.150 sec]

Checking https://iplists.firehol.org/files/socks_proxy_1d.ipset
[Valid] [Entries: 3061] [Processing Time: 380 ms or 0.380 sec]

Checking https://iplists.firehol.org/files/spamhaus_drop.netset
[Valid] [Entries: 973] [Processing Time: 210 ms or 0.210 sec]

Checking https://iplists.firehol.org/files/spamhaus_edrop.netset
[Valid] [Entries: 285] [Processing Time: 170 ms or 0.170 sec]

Checking https://iplists.firehol.org/files/sslproxies_1d.ipset
[Valid] [Entries: 207] [Processing Time: 150 ms or 0.150 sec]

Checking https://iplists.firehol.org/files/tor_exits_30d.ipset
[Valid] [Entries: 1142] [Processing Time: 220 ms or 0.220 sec]

Checking https://iplists.firehol.org/files/urlvir.ipset
[Valid] [Entries: 171] [Processing Time: 150 ms or 0.150 sec]

Checking https://raw.githubusercontent.com/SecOps-Institute/Tor-IP-Addresses/master/tor-exit-nodes.lst
[Valid] [Entries: 2169] [Processing Time: 110 ms or 0.110 sec]

Checking https://raw.githubusercontent.com/stamparm/ipsum/master/levels/3.txt
[Valid] [Entries: 18015] [Processing Time: 200 ms or 0.200 sec]

Checking https://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt
[Valid] [Entries: 1033] [Processing Time: 560 ms or 0.560 sec]

Checking https://rules.emergingthreats.net/blockrules/compromised-ips.txt
[Valid] [Entries: 614] [Processing Time: 450 ms or 0.450 sec]

Checking https://sigs.interserver.net/iprbl.txt
[Valid] [Entries: 12225] [Processing Time: 730 ms or 0.730 sec]

Checking https://feodotracker.abuse.ch/downloads/ipblocklist.txt
[Valid] [Entries: 11] [Processing Time: 110 ms or 0.110 sec]

Checking https://sslbl.abuse.ch/blacklist/sslipblacklist.txt
[Valid] [Entries: 47] [Processing Time: 120 ms or 0.120 sec]

Checking https://www.team-cymru.org/Services/Bogons/fullbogons-ipv4.txt
[Valid] [Entries: 686] [Processing Time: 820 ms or 0.820 sec]

Checking https://www.binarydefense.com/banlist.txt
[Valid] [Entries: 2117] [Processing Time: 250 ms or 0.250 sec]

Checking https://cinsscore.com/list/ci-badguys.txt
[Valid] [Entries: 15000] [Processing Time: 1100 ms or 1.100 sec]

Checking https://www.talosintelligence.com/documents/ip-blacklist
[Valid] [Entries: 1618] [Processing Time: 1080 ms or 1.080 sec]

--------------------------------------------------------------------------
[Valid Lists]: 43
[Invalid Lists]: 0
[Total Items Checked]: 281761
[Total Processing Runtime]: 26490 ms or 26.490 sec
Right... that first entry looks iffy... with the operand error... I'd remove that if I were you.
 
That worked... :)

Ok... then what is the difference then between them?
The other method you were trying was expecting a long single column list of IP addresses in a single file. You were giving it a bunch of URLs... and didn't know what to do with all that. ;)
 
Hi All,

Since today I see this when I ask for stats:

Code:
148x       | 79.124.62.130   ({                                                                                                                                                                                                                                                                        
    "errorCode": "OVER_QUERY_LIMIT",                                                                                                                                                                                                                                                                    
    "error": "maximum number of queries per day exceeded"                                                                                                                                                                                                                                              
}) | https://otx.alienvault.com/indicator/ip/79.124.62.130   | BanMalware: ci-badguys.txt                    |

I did this on command line because the stats in WebUi was blank. After a update stats I saw "complete" and then nothing.
 
Hello! Can anybody help me please? I faced this issue after installing Skynet and cant find any working solution or understand what caused it. Do you have any ideas or solutions how to fix that?

Code:
[1-5]: 2

Input Custom Filter List URL:
[URL]: https://raw.githubusercontent.com/ViktorJp/Skynet/main/filter.list

[$] /jffs/scripts/firewall banmalware https://raw.githubusercontent.com/ViktorJp/Skynet/main/filter.


=====================================================================================================


killall: syslog-ng: no process killed
[i] Custom Filter Detected: https://raw.githubusercontent.com/ViktorJp/Skynet/main/filter.list
[i] Downloading filter.list         | [0s]
[i] Refreshing Whitelists           | [8s]
[i] Consolidating Blacklist         | [0s]
[*] List Content Error Detected - Stopping Banmalware


=====================================================================================================


[#] 1 IPs (+0) -- 0 Ranges Banned (+0) || 0 Inbound -- 0 Outbound Connections Blocked! [banmalware] ]



[i] Press Enter To Continue...
 
You're running obsolete firmware on your router(s) (if your signature is current).
 
You're running obsolete firmware on your router(s) (if your signature is current).
Updated signature info, it was obsolete but I use the latest firmware
 

Latest threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top