>From the iptables manual: recent Allows you to dynamically create a list of IP addresses and then match against that list in a few different ways. For example, you can create a "badguy" list out of people attempting to connect to port 139 on your firewall and then DROP all future packets from them without considering them. [...] Steve’s ipt_recent website (http://snowman.net/projects/ipt_recent/) also has some examples of usage. I think that's what you were looking for ;) -- Calin Key fingerprint = 37B8 0DA5 9B2A 8554 FB2B 4145 5DC1 15DD A3EF E857 ================================================= What's so funny?