Skip to content

Latest commit

 

History

History
43 lines (31 loc) · 3.62 KB

README.md

File metadata and controls

43 lines (31 loc) · 3.62 KB

IPv4 lookup lists.

These files present a large range of public Internet IPv4 provider/country to address lookup. It's a bit like a 'reverse WHOIS', where you have the country or provider name and can reference these files to find the associated IPv4 addresses.

These files are in the .p2p file format which is compatible with Peerblock and Peerguardian. The file format consists of the following markdown (in most cases);

STARTADDRESS - END ADDRESS - DETAILS (all free text) STARTADDRESS-ENDADDRESS

In some cases, the free text may be in CIDR format. Most entries include the details along with the date that it was recorded.

The files are all plain text format and readable using Notepad, Notepad++, Vim, etc. They have been lovingly hand created and maintained since 2006 by the author.

Use cases include;

  • Deny IPv4 from specific countries (GEOIP), network providers or Government / Military
  • Allow IPv4 from specific countries (GEOIP), network providers or Government / Military
  • You have a firewall which is DENY ALL, and wish to 'punch a few holes in it' for specific providers or organisations (ORGIP) - you may find your network provider listed here.
  • You wish to block network access from a specific provider / organisation (ORGIP).
  • OSINT - Discovery of an IPv4 address from an organisation name.
  • You want to launch a port scan and ensure certain organisations or countries are excluded to reduce the risk of complaints from less tolerant targets.
  • Hardening your infrastructure by applying filtering to reduce the possibility of a cyber-attack.
  • To limit outbound Internet traffic to only specific providers or countries (helps to lock down hosts which are compromised and are attempting to 'phone home' to their Command and Control (C&C / C2) server).
  • WAF bypass. Configure your WAF/IPS/IDS to respond in a different manner depending on the source inbound IP address.
  • Anti-spam filtering. Configure your packet-based firewall to block specific IP address ranges for SMTP or configure your SMTP receiver to allow or deny specific IP ranges. You could also make use of a host-based firewall.
  • Whitelist IP address ranges for SMTP greylisting or DNSBL bypass.
  • Search for large ranges of potentially unused IP addresses - Some large providers are now making offers for the transfer of some of these previously unused IPv4 address blocks.
  • Azure Conditional Access Policies which make use of IPv4 addresses. Azure offers GEOIP but not ORGIP.
  • Target audience - You already know who your target audience is (for your servers), so these lists could help you restrict access accordingly.
  • Fraud prevention - As part of a 'defense-in-depth' strategy, if you provide services to clients, using these lists could help to work out the risk profile of an IP address.

The lists can be adapted to suit your needs and the information within applied to commercial enterprise-grade and open source firewalls.

NOTE1: I do not maintain lists of abusive or malicious bad IPv4 addresses - there is already a respected source for this data - please see https://www.abuseipdb.com/

NOTE2: Some country lists may not be fully populated due to recording the IPv4 addresses within the test files related to a specific provider or organisation. Use both the country and the org lists for your maximum enjoyment.

** As of 04th June 2024 the list officially reached over 2 billion IPv4 addresses. We had a little party.... **

Disclaimer; No warranty is given for any inaccuracies, loss of service or otherwise. The term IP and IPv4 are used interchangeably in this repo.

These lists are pretty good and very comprehensive, but not 100% world coverage. There's always something to be added....