# # atlas_attacks_7d # # ipv4 hash:ip ipset # # [ATLAS Attacks] (https://atlas.arbor.net/summary/attacks) - # ATLAS uses lightweight honeypot sensors to detect and # fingerprint the attacks launched by malicious sources on # the Internet. In most cases the attacker is trying to take # control of the target via a published exploit for a known # vulnerability. A variety of exploit tools exist and are # usually written specifically for each attack vector. # Exploit attempts and attacks are most often launched from # bots (hosts under an attacker's control), which will # automatically try to exploit any possible host on the # Internet. Attack origins are usually not spoofed, although # the source host may be compromised or infected with malware. # # Maintainer : Arbor Networks # Maintainer URL : https://atlas.arbor.net/ # List source URL : https://atlas.arbor.net/summary/attacks.csv # Source File Date: Mon Nov 21 00:08:31 UTC 2016 # # Category : attacks # Version : 170 # # This File Date : Mon Nov 21 06:24:02 UTC 2016 # Update Frequency: 1 day # Aggregation : 7 days # Entries : 40 unique IPs # # Full list analysis, including geolocation map, history, # retention policy, overlaps with other lists, etc. # available at: # # http://iplists.firehol.org/?ipset=atlas_attacks_7d # # Generated by FireHOL's update-ipsets.sh # Processed with FireHOL's iprange # 23.234.51.33 24.172.251.54 40.74.124.185 45.76.134.144 45.115.39.125 60.6.38.2 60.10.253.62 66.135.104.194 71.248.167.22 74.208.174.238 77.59.214.138 77.69.2.70 78.129.171.154 79.129.35.192 85.159.233.111 91.187.98.242 93.174.93.144 104.130.159.30 104.247.194.58 106.184.2.29 128.232.110.29 137.226.113.7 139.162.13.205 139.162.32.13 162.209.125.33 163.172.77.10 166.78.18.210 169.229.3.91 185.94.111.1 185.128.40.162 187.158.96.33 187.158.97.242 189.11.158.42 189.45.199.194 189.170.187.49 204.42.253.2 204.42.253.130 209.126.136.2 222.186.56.48 222.186.56.248