# # atlas_attacks # # ipv4 hash:ip ipset # # [ATLAS Attacks] (https://atlas.arbor.net/summary/attacks) - # ATLAS uses lightweight honeypot sensors to detect and # fingerprint the attacks launched by malicious sources on # the Internet. In most cases the attacker is trying to take # control of the target via a published exploit for a known # vulnerability. A variety of exploit tools exist and are # usually written specifically for each attack vector. # Exploit attempts and attacks are most often launched from # bots (hosts under an attacker's control), which will # automatically try to exploit any possible host on the # Internet. Attack origins are usually not spoofed, although # the source host may be compromised or infected with malware. # # Maintainer : Arbor Networks # Maintainer URL : https://atlas.arbor.net/ # List source URL : https://atlas.arbor.net/summary/attacks.csv # Source File Date: Mon Nov 21 00:08:31 UTC 2016 # # Category : attacks # Version : 171 # # This File Date : Mon Nov 21 06:24:02 UTC 2016 # Update Frequency: 1 day # Aggregation : none # Entries : 10 unique IPs # # Full list analysis, including geolocation map, history, # retention policy, overlaps with other lists, etc. # available at: # # http://iplists.firehol.org/?ipset=atlas_attacks # # Generated by FireHOL's update-ipsets.sh # Processed with FireHOL's iprange # 24.172.251.54 40.74.124.185 71.248.167.22 74.208.174.238 77.69.2.70 104.130.159.30 104.247.194.58 139.162.32.13 162.209.125.33 185.94.111.1