# # atlas_attacks_2d # # ipv4 hash:ip ipset # # [ATLAS Attacks] (https://atlas.arbor.net/summary/attacks) - # ATLAS uses lightweight honeypot sensors to detect and # fingerprint the attacks launched by malicious sources on # the Internet. In most cases the attacker is trying to take # control of the target via a published exploit for a known # vulnerability. A variety of exploit tools exist and are # usually written specifically for each attack vector. # Exploit attempts and attacks are most often launched from # bots (hosts under an attacker's control), which will # automatically try to exploit any possible host on the # Internet. Attack origins are usually not spoofed, although # the source host may be compromised or infected with malware. # # Maintainer : Arbor Networks # Maintainer URL : https://atlas.arbor.net/ # List source URL : https://atlas.arbor.net/summary/attacks.csv # Source File Date: Mon Nov 21 00:08:31 UTC 2016 # # Category : attacks # Version : 171 # # This File Date : Mon Nov 21 06:24:02 UTC 2016 # Update Frequency: 1 day # Aggregation : 2 days # Entries : 19 unique IPs # # Full list analysis, including geolocation map, history, # retention policy, overlaps with other lists, etc. # available at: # # http://iplists.firehol.org/?ipset=atlas_attacks_2d # # Generated by FireHOL's update-ipsets.sh # Processed with FireHOL's iprange # 24.172.251.54 40.74.124.185 66.135.104.194 71.248.167.22 74.208.174.238 77.59.214.138 77.69.2.70 78.129.171.154 79.129.35.192 104.130.159.30 104.247.194.58 139.162.32.13 162.209.125.33 163.172.77.10 166.78.18.210 185.94.111.1 189.170.187.49 204.42.253.2 222.186.56.248