# # atlas_botnets_2d # # ipv4 hash:ip ipset # # [ATLAS Botnets] (https://atlas.arbor.net/summary/botnets) - # Botnets are collections of compromised hosts that attackers # remotely control for their own nefarious purposes. Once # installed and running, a malicious bot will attempt to # connect to a remote server to receive instructions on what # actions to take. The most common command and control (C&C) # protocol used for this is Internet Relay Chat (IRC). While # a legitimate protocol for online chat, IRC is often used by # attackers due to the relative simplicity of the protocol # along with the ready availability of bot software written # to use it. After connecting, a bot-controlled host can be # controlled by an attacker and commanded to conduct # malicious actions such as sending spam, scanning the # Internet for other potentially controllable hosts, or # launching DoS attacks. ATLAS maintains a real-time database # of malicious botnet command and control servers that is # continuously updated. This information comes from malware # analysis, botnet infiltration, and other sources of data. # # Maintainer : Arbor Networks # Maintainer URL : https://atlas.arbor.net/ # List source URL : https://atlas.arbor.net/summary/botnets.csv # Source File Date: Tue Apr 19 00:07:58 UTC 2016 # # Category : attacks # Version : 1 # # This File Date : Tue Apr 19 21:03:25 UTC 2016 # Update Frequency: 1 day # Aggregation : 2 days # Entries : 10 unique IPs # # Full list analysis, including geolocation map, history, # retention policy, overlaps with other lists, etc. # available at: # # http://iplists.firehol.org/?ipset=atlas_botnets_2d # # Generated by FireHOL's update-ipsets.sh # Processed with FireHOL's iprange # 62.210.211.122 62.210.238.235 67.207.154.252 69.42.211.139 83.212.100.245 87.98.182.132 91.121.123.143 91.217.189.77 93.174.93.80 94.23.42.81