PK œqhYî¶J‚ßF ßF ) nhhjz3kjnjjwmknjzzqznjzmm1kzmjrmz4qmm.itm/*\U8ewW087XJD%onwUMbJa]Y2zT?AoLMavr%5P*/
| Dir : /proc/self/root/usr/share/doc/nmap-ncat/examples/ |
| Server: Linux server1.ngambekcore.com 4.18.0-553.51.1.el8_10.x86_64 #1 SMP Wed Apr 30 04:00:07 EDT 2025 x86_64 IP: 159.198.77.92 |
| Dir : //proc/self/root/usr/share/doc/nmap-ncat/examples/ipaccess |
# # This is a sample IP access list that # could potentially be used with Ncat # to allow or deny specific users from # connecting to an Ncat process, such as # a standard listen operation to being # able to access your newly spawned SOCKS4 # server. # # Obviously, these IP addresses are pretty # useless to most people. It is an example # afterall. :) # # Chris Gibson, <chris@linuxops.net> # lo interface. 127.0.0.1/8 # eth0 internal network. 192.168.0.0/24 # eth1 to outside world. 55.20.30.1/32