blocklist-ipsets/atlas_attacks_7d.ipset

81 lines
1.9 KiB
Plaintext

#
# atlas_attacks_7d
#
# ipv4 hash:ip ipset
#
# [ATLAS Attacks] (https://atlas.arbor.net/summary/attacks) -
# ATLAS uses lightweight honeypot sensors to detect and
# fingerprint the attacks launched by malicious sources on
# the Internet. In most cases the attacker is trying to take
# control of the target via a published exploit for a known
# vulnerability. A variety of exploit tools exist and are
# usually written specifically for each attack vector.
# Exploit attempts and attacks are most often launched from
# bots (hosts under an attacker's control), which will
# automatically try to exploit any possible host on the
# Internet. Attack origins are usually not spoofed, although
# the source host may be compromised or infected with malware.
#
# Maintainer : Arbor Networks
# Maintainer URL : https://atlas.arbor.net/
# List source URL : https://atlas.arbor.net/summary/attacks.csv
# Source File Date: Mon Nov 21 00:08:31 UTC 2016
#
# Category : attacks
# Version : 170
#
# This File Date : Mon Nov 21 06:24:02 UTC 2016
# Update Frequency: 1 day
# Aggregation : 7 days
# Entries : 40 unique IPs
#
# Full list analysis, including geolocation map, history,
# retention policy, overlaps with other lists, etc.
# available at:
#
# http://iplists.firehol.org/?ipset=atlas_attacks_7d
#
# Generated by FireHOL's update-ipsets.sh
# Processed with FireHOL's iprange
#
23.234.51.33
24.172.251.54
40.74.124.185
45.76.134.144
45.115.39.125
60.6.38.2
60.10.253.62
66.135.104.194
71.248.167.22
74.208.174.238
77.59.214.138
77.69.2.70
78.129.171.154
79.129.35.192
85.159.233.111
91.187.98.242
93.174.93.144
104.130.159.30
104.247.194.58
106.184.2.29
128.232.110.29
137.226.113.7
139.162.13.205
139.162.32.13
162.209.125.33
163.172.77.10
166.78.18.210
169.229.3.91
185.94.111.1
185.128.40.162
187.158.96.33
187.158.97.242
189.11.158.42
189.45.199.194
189.170.187.49
204.42.253.2
204.42.253.130
209.126.136.2
222.186.56.48
222.186.56.248