mmmm .8MMMMMMZ. .8MMMMMMMMMMMMMMMM 8MMMMMMMMMMMMMMMMMMMI ,MMMMMM- MMMMMMO= MMMMM. .MMMMM MMM7 MMMM DM~ =MMMMN MMMM = MMMM MMMM MMMMM. MMM IMMMM. MMMM MMMM,.MMMMM 8MM? 8MMMM MMMM NMM: MMMM. MMM MMM MMMM M MMMM, MMM MMMM MMMM MMM= 8MMMIMMMMM,MMMM. MMMMMMMMMMMMMMMMMMMMMMMM MMMMMMM8= MMM 8MM .M MMM MMM MMMMMMMMMMMM MMMMMMMMMMMMMMMMMO MMM MMM MMMIMMMMMMMMMMMMMM, 8MMMMMMMMMMMMMMMMMMMMMMMMMMMMM MMMMMMMMMMMM8 = ~MM MMM. MM. MMM MMMM DMMMM +MMM MMMMZ MMMM MMMMMM MMMM MMMM MMMMM .MMMMMM MMMMM MMMM MMMM MMMMMM :MMMMM MMM MM? MMMMM MMMMM MM. .MM MMM HEI =============================================================================== Legend for current Hei rules ---------------------------- amplifiers Easily exploitable services for amplification broken_http Broken inbound HTTP (known services) cryptocoin Cryptocoin miners databases Database servers dns Incoming DNS queries http_scan HTTP/S scans low_ports Low ports (<1024) netbios NetBIOS netis Netis router exploit ntp NTP proxy_scan Scans for HTTP/S and SOCKS proxies remote_access Remote access services (RDP, VNC, etc.) samba Samba (Windows shares) sip SIP ports ssdp SSDP ssh SSH synology Synology NAS telnet Telnet torrent Common Torrent ports