forked from theiren46/blocklist-ipsets
-
Notifications
You must be signed in to change notification settings - Fork 0
/
atlas_scans.ipset
53 lines (53 loc) · 1.68 KB
/
atlas_scans.ipset
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
#
# atlas_scans
#
# ipv4 hash:ip ipset
#
# [ATLAS Scans] (https://atlas.arbor.net/summary/scans) -
# Host scanning is a process whereby automated network sweeps
# are initiated in search of hosts running a particular
# service. This may be indicative of either legitimate host
# scanners (including network management systems and
# authorized vulnerability scanners) or an attacker (or
# automated malicious code, such as a worm) trying to
# enumerate potential hosts for subsequent compromise. Scans
# are often the prelude to an attack, and services scanned by
# attackers usually indicate known vulnerabilities for those
# services. Types of port scans include connect() scans, SYN
# scans, stealth scans, bounce scans, XMAS and Null scans.
# All reveal to the attacker which services on what hosts are
# listening for connections. Scans may be launched from
# compromised hosts, and their sources may be forged.
#
# Maintainer : Arbor Networks
# Maintainer URL : https://atlas.arbor.net/
# List source URL : https://atlas.arbor.net/summary/scans.csv
# Source File Date: Thu Dec 1 00:47:00 UTC 2016
#
# Category : attacks
# Version : 201
#
# This File Date : Fri Dec 2 01:28:03 UTC 2016
# Update Frequency: 1 day
# Aggregation : none
# Entries : 10 unique IPs
#
# Full list analysis, including geolocation map, history,
# retention policy, overlaps with other lists, etc.
# available at:
#
# http://iplists.firehol.org/?ipset=atlas_scans
#
# Generated by FireHOL's update-ipsets.sh
# Processed with FireHOL's iprange
#
40.74.124.185
45.116.80.244
51.15.39.98
62.210.189.39
82.165.149.182
89.163.242.244
108.177.134.114
158.69.118.235
166.78.18.210
209.126.117.215