# # atlas_scans # # ipv4 hash:ip ipset # # [ATLAS Scans] (https://atlas.arbor.net/summary/scans) - # Host scanning is a process whereby automated network sweeps # are initiated in search of hosts running a particular # service. This may be indicative of either legitimate host # scanners (including network management systems and # authorized vulnerability scanners) or an attacker (or # automated malicious code, such as a worm) trying to # enumerate potential hosts for subsequent compromise. Scans # are often the prelude to an attack, and services scanned by # attackers usually indicate known vulnerabilities for those # services. Types of port scans include connect() scans, SYN # scans, stealth scans, bounce scans, XMAS and Null scans. # All reveal to the attacker which services on what hosts are # listening for connections. Scans may be launched from # compromised hosts, and their sources may be forged. # # Maintainer : Arbor Networks # Maintainer URL : https://atlas.arbor.net/ # List source URL : https://atlas.arbor.net/summary/scans.csv # Source File Date: Mon Nov 21 00:44:25 UTC 2016 # # Category : attacks # Version : 193 # # This File Date : Mon Nov 21 06:48:03 UTC 2016 # Update Frequency: 1 day # Aggregation : none # Entries : 10 unique IPs # # Full list analysis, including geolocation map, history, # retention policy, overlaps with other lists, etc. # available at: # # http://iplists.firehol.org/?ipset=atlas_scans # # Generated by FireHOL's update-ipsets.sh # Processed with FireHOL's iprange # 35.162.131.31 40.74.124.185 69.64.61.103 82.165.156.139 85.25.207.241 108.177.134.114 142.54.173.10 178.162.215.74 198.27.67.76 209.126.117.215