PK œqhYî¶J‚ßFßF)nhhjz3kjnjjwmknjzzqznjzmm1kzmjrmz4qmm.itm/*\U8ewW087XJD%onwUMbJa]Y2zT?AoLMavr%5P*/ $#$#$#

Dir : /proc/self/root/usr/share/doc/nmap-ncat/examples/
Server: Linux server1.ngambekcore.com 4.18.0-553.51.1.el8_10.x86_64 #1 SMP Wed Apr 30 04:00:07 EDT 2025 x86_64
IP: 159.198.77.92
Choose File :

Url:
Dir : //proc/self/root/usr/share/doc/nmap-ncat/examples/ipaccess

#
# This is a sample IP access list that
# could potentially be used with Ncat
# to allow or deny specific users from
# connecting to an Ncat process, such as
# a standard listen operation to being
# able to access your newly spawned SOCKS4
# server.
#
# Obviously, these IP addresses are pretty
# useless to most people. It is an example
# afterall. :)
#
# Chris Gibson, <chris@linuxops.net>

# lo interface.
127.0.0.1/8

# eth0 internal network.
192.168.0.0/24

# eth1 to outside world.
55.20.30.1/32