( csucsu | 2013. 05. 05., v – 15:52 )

[root@host83 log]# iptables -nvL INPUT
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
96 5702 fail2ban-Named tcp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 53,953
149K 27M BASE_INPUT_CHAIN all -- * * 0.0.0.0/0 0.0.0.0/0
5198 544K INPUT_CHAIN all -- * * 0.0.0.0/0 0.0.0.0/0
5198 544K HOST_BLOCK_SRC all -- * * 0.0.0.0/0 0.0.0.0/0
5198 544K SPOOF_CHK all -- * * 0.0.0.0/0 0.0.0.0/0
5195 543K VALID_CHK all -- eth0 * 0.0.0.0/0 0.0.0.0/0
5156 542K EXT_INPUT_CHAIN !icmp -- eth0 * 0.0.0.0/0 0.0.0.0/0 state NEW
1 28 EXT_INPUT_CHAIN icmp -- eth0 * 0.0.0.0/0 0.0.0.0/0 state NEW limit: avg 60/sec burst 100
0 0 EXT_ICMP_FLOOD_CHAIN icmp -- eth0 * 0.0.0.0/0 0.0.0.0/0 state NEW
0 0 POST_INPUT_CHAIN all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 5 LOG flags 0 level 7 prefix `AIF:Dropped INPUT packet: '
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * * 31.222.133.87 0.0.0.0/0
0 0 DROP all -- eth0 * 31.222.133.87 0.0.0.0/0
0 0 DROP all -- eth0:0 * 31.222.133.87 0.0.0.0/0
0 0 DROP all -- eth0 * 31.222.133.87 0.0.0.0/0