Ok here is the output:
Code:
root@vps:~# iptables -L -n -v
Chain INPUT (policy DROP 1694 packets, 84578 bytes)
pkts bytes target prot opt in out source destination
8 404 ACCEPT tcp -- * * xx.xx.xxx.xx/29 0.0.0.0/0 state NEW tcp dpt:50xxx
62638 5152K ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
822K 136M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 DROP tcp -- * * 188.165.238.177 0.0.0.0/0 tcp dpt:80
0 0 DROP tcp -- * * 83.222.230.108 0.0.0.0/0 tcp dpt:80
54 2688 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:25 state NEW
70622 4123K ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 state NEW
1269 73316 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 state NEW
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy DROP 20 packets, 51308 bytes)
pkts bytes target prot opt in out source destination
62638 5152K ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
598K 861M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
256 15360 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:25 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 state NEW
708 48668 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 state NEW
20 1200 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 state NEW
2722 207K ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:123 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 state NEW
2824 4426K LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix `Drop illegal outgoing pkt: '
I have blanked out my ssh port and lan ip address range but they are shown correctly.
It seems to match my script rules to me.
Do you think I need to be concerned about the blocked outgoing packets? Let me know what you think?