# Generated by xtables-save v1.8.2 on Thu Jan 7 14:38:21 2021 #Recommended iptables for cloudflare *filter :INPUT ACCEPT [0:0] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [0:0] :port-scanning - [0:0] -A INPUT -s 173.245.48.0/20 -p tcp -m tcp --dport 443 -j ACCEPT -A INPUT -s 173.245.48.0/20 -p tcp -m tcp --dport 80 -j ACCEPT -A INPUT -s 103.21.244.0/22 -p tcp -m tcp --dport 80 -j ACCEPT -A INPUT -s 103.21.244.0/22 -p tcp -m tcp --dport 443 -j ACCEPT -A INPUT -s 103.22.200.0/22 -p tcp -m tcp --dport 80 -j ACCEPT -A INPUT -s 103.22.200.0/22 -p tcp -m tcp --dport 443 -j ACCEPT -A INPUT -s 103.31.4.0/22 -p tcp -m tcp --dport 80 -j ACCEPT -A INPUT -s 103.31.4.0/22 -p tcp -m tcp --dport 443 -j ACCEPT -A INPUT -s 141.101.64.0/18 -p tcp -m tcp --dport 80 -j ACCEPT -A INPUT -s 141.101.64.0/18 -p tcp -m tcp --dport 443 -j ACCEPT -A INPUT -s 108.162.192.0/18 -p tcp -m tcp --dport 80 -j ACCEPT -A INPUT -s 108.162.192.0/18 -p tcp -m tcp --dport 443 -j ACCEPT -A INPUT -s 190.93.240.0/20 -p tcp -m tcp --dport 80 -j ACCEPT -A INPUT -s 190.93.240.0/20 -p tcp -m tcp --dport 443 -j ACCEPT -A INPUT -s 188.114.96.0/20 -p tcp -m tcp --dport 80 -j ACCEPT -A INPUT -s 188.114.96.0/20 -p tcp -m tcp --dport 443 -j ACCEPT -A INPUT -s 197.234.240.0/22 -p tcp -m tcp --dport 80 -j ACCEPT -A INPUT -s 197.234.240.0/22 -p tcp -m tcp --dport 443 -j ACCEPT -A INPUT -s 198.41.128.0/17 -p tcp -m tcp --dport 80 -j ACCEPT -A INPUT -s 198.41.128.0/17 -p tcp -m tcp --dport 443 -j ACCEPT -A INPUT -s 162.158.0.0/15 -p tcp -m tcp --dport 80 -j ACCEPT -A INPUT -s 162.158.0.0/15 -p tcp -m tcp --dport 443 -j ACCEPT -A INPUT -s 104.16.0.0/12 -p tcp -m tcp --dport 80 -j ACCEPT -A INPUT -s 104.16.0.0/12 -p tcp -m tcp --dport 443 -j ACCEPT -A INPUT -s 172.64.0.0/13 -p tcp -m tcp --dport 80 -j ACCEPT -A INPUT -s 172.64.0.0/13 -p tcp -m tcp --dport 443 -j ACCEPT -A INPUT -s 172.64.0.0/13 -p tcp -m tcp --dport 443 -j ACCEPT -A INPUT -s 172.64.0.0/13 -p tcp -m tcp --dport 80 -j ACCEPT -A INPUT -p tcp -m tcp --dport 80 -j DROP -A INPUT -p tcp -m tcp --dport 443 -j DROP -A INPUT -p tcp -m tcp --dport 22 -m conntrack --ctstate NEW -m recent --set --name DEFAULT --mask 255.255.255.255 --rsource -A INPUT -p tcp -m tcp --dport 22 -m conntrack --ctstate NEW -m recent --update --seconds 60 --hitcount 10 --name DEFAULT --mask 255.255.255.255 --rsource -j DROP -A port-scanning -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK RST -m limit --limit 1/sec --limit-burst 2 -j RETURN -A port-scanning -j DROP COMMIT # Completed on Thu Jan 7 14:38:21 2021 # Generated by xtables-save v1.8.2 on Thu Jan 7 14:38:21 2021 *nat :PREROUTING ACCEPT [0:0] :INPUT ACCEPT [0:0] :POSTROUTING ACCEPT [0:0] :OUTPUT ACCEPT [0:0] COMMIT # Completed on Thu Jan 7 14:38:21 2021 # Generated by xtables-save v1.8.2 on Thu Jan 7 14:38:21 2021 *mangle :PREROUTING ACCEPT [0:0] :INPUT ACCEPT [0:0] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [0:0] :POSTROUTING ACCEPT [0:0] COMMIT # Completed on Thu Jan 7 14:38:21 2021 # 157286