Linux srv25.usacloudserver.us 5.14.0-570.39.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Sep 4 05:08:52 EDT 2025 x86_64
LiteSpeed
Server IP : 23.137.84.82 & Your IP : 216.73.216.127
Domains :
Cant Read [ /etc/named.conf ]
User : epicgamerzoneco
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
opt /
cpguard /
app /
scripts /
Delete
Unzip
Name
Size
Permission
Date
Action
csf_action.php
6.05
KB
-rwxr-xr-x
2024-11-08 06:51
csf_migration.php
21.32
KB
-rwxr-xr-x
2025-09-26 13:25
cwp_suspend_hook.php
3.34
KB
-rw-r--r--
2023-09-25 10:22
cwp_user_list.php
639
B
-rw-r--r--
2023-09-25 10:22
cyberpanel_domain_list.php
3.51
KB
-rw-r--r--
2023-09-25 10:22
cyberpanel_user_list.php
792
B
-rw-r--r--
2023-09-25 10:22
enhance_domain_list.php
3.6
KB
-rw-r--r--
2023-09-25 10:22
enhance_suspend_hook.php
7.63
KB
-rw-r--r--
2023-09-25 10:22
enhance_user_list.php
3.79
KB
-rw-r--r--
2023-09-25 10:22
fw_debug.sh
3.42
KB
-rw-r--r--
2025-10-13 09:29
fw_list.sh
5.02
KB
-rw-r--r--
2025-10-13 09:29
interworx_domain_list.php
583
B
-rw-r--r--
2023-09-25 10:22
interworx_suspend_hook.php
3.63
KB
-rw-r--r--
2023-09-25 10:22
interworx_user_list.php
533
B
-rw-r--r--
2023-09-25 10:22
ioncube.php
42
B
-rw-r--r--
2022-12-02 17:04
reset_iptables.sh
3.6
KB
-rw-r--r--
2025-10-16 14:19
suspend_hook_sample.php
3.28
KB
-rw-r--r--
2023-09-25 10:22
virus_hook_sample.php
3.36
KB
-rw-r--r--
2023-09-25 10:22
webmin_domain_list.php
767
B
-rw-r--r--
2023-09-25 10:22
webmin_suspend_hook.php
3.32
KB
-rw-r--r--
2023-09-25 10:22
webmin_user_list.php
648
B
-rw-r--r--
2023-09-25 10:22
webuzo_domain_list.php
609
B
-rw-r--r--
2023-09-25 10:22
webuzo_suspend_hook.php
3.61
KB
-rw-r--r--
2023-09-25 10:22
webuzo_user_list.php
493
B
-rw-r--r--
2023-09-25 10:22
Save
Rename
#!/bin/bash # # fw-debug.sh - Basic nftables & firewall diagnostic tool # Safe: read-only checks only. No system changes. # FAMILY="inet" TABLE="cpguard_fw" VALID_PATHS=( "/usr/sbin/nft" "/sbin/nft" "/usr/bin/nft" "/bin/nft" ) GREEN="\e[32m"; RED="\e[31m"; YELLOW="\e[33m"; CYAN="\e[36m"; RESET="\e[0m" check() { echo -e "${CYAN}==> $1${RESET}" } status() { if [ "$1" -eq 0 ]; then echo -e " ${GREEN}✔ $2${RESET}" else echo -e " ${RED}✘ $2${RESET}" fi } warn() { echo -e " ${YELLOW}⚠ $1${RESET}" } # --- Root check --- if [ "$EUID" -ne 0 ]; then echo -e "${RED}✘ Please run this script as root.${RESET}" exit 1 fi echo -e "${CYAN}\nFirewall Debug Tool - nftables Diagnostics${RESET}" echo "---------------------------------------------" # 1. Check nft binary in specific allowed paths check "Checking for nft binary in standard paths..." NFT_PATH=$(command -v nft 2>/dev/null) if [[ -z "$NFT_PATH" ]]; then status 1 "nft binary not found. Please install nftables." exit 1 fi if [[ " ${VALID_PATHS[*]} " =~ " ${NFT_PATH} " ]]; then status 0 "nft binary found at ${NFT_PATH}" else status 1 "nft binary found at ${NFT_PATH}, but not in standard paths." echo -e " Valid paths are:" for p in "${VALID_PATHS[@]}"; do echo " - $p" done exit 1 fi # 2. Check nft version check "Checking nft version..." NFT_VER=$(nft --version 2>/dev/null | awk '{print $2}') if [[ -z "$NFT_VER" ]]; then status 1 "Unable to determine nft version (possibly broken install)" else status 0 "nft version: $NFT_VER" fi # 3. Kernel version check "Checking kernel version..." KERNEL_VER=$(uname -r) K_MAJOR=$(echo "$KERNEL_VER" | cut -d. -f1) K_MINOR=$(echo "$KERNEL_VER" | cut -d. -f2) echo -e " Kernel version: ${KERNEL_VER}" if (( K_MAJOR < 5 )); then warn "Kernel is very old (<5.x). nftables may not fully support features." elif (( K_MAJOR == 5 && K_MINOR < 10 )); then warn "Kernel is older than 5.10. Some nft features may be missing." else status 0 "Kernel version is recent enough" fi # 4. nftables table and chains check "Checking nftables table and basic chains..." if nft list table $FAMILY $TABLE >/dev/null 2>&1; then status 0 "Table '$FAMILY $TABLE' exists" CHAINS=$(nft list table $FAMILY $TABLE | grep -E 'chain ' | awk '{print $2}') echo " Chains found: $CHAINS" else status 1 "Table '$FAMILY $TABLE' not found. Firewall likely not initialized." fi # 5. nft ruleset validity check "Checking nftables ruleset syntax..." if nft list ruleset >/dev/null 2>&1; then status 0 "Ruleset dump successful" else status 1 "Failed to read ruleset (broken setup or invalid rules)" fi # 6. Systemd service check "Checking nftables service status..." if systemctl list-unit-files | grep -q nftables.service; then if systemctl is-active --quiet nftables; then status 0 "nftables service is active" else warn "nftables service exists but is not active" fi else warn "nftables service not found (manual setup likely)" fi # 7. IPv6 availability check "Checking IPv6 availability..." if [ -f /proc/net/if_inet6 ]; then status 0 "IPv6 supported" else warn "IPv6 not supported or disabled" fi echo -e "\n${CYAN}Diagnostics completed.${RESET}" echo "---------------------------------------------" echo -e "If any ${RED}✘${RESET} or ${YELLOW}⚠${RESET} items appear above, please share this output with support.\n"