IP-BlockList-v4 is a threat intelligence feed based on 30+ different publicly available lists of suspicious and/or malicious IP addresses. All lists are automatically retrieved and parsed on a daily (24h) basis and the final result is pushed to this repository. List is made of IP addresses together with a total number of (black)list occurrence (for each). Greater the number, lesser the chance of false positive detection and/or dropping in (inbound) monitored traffic. Also, list is sorted from most (problematic) to least occurent IP addresses.
As an example, to get a fresh and ready-to-deploy auto-ban list of "bad IPs" that appear on at least 3 (black)lists you can run:
curl --compressed https://raw.githubusercontent.com/scriptzteam/IP-BlockList-v4/master/ips.txt 2>/dev/null | grep -v "#" | grep -v -E "\s[1-2]$" | cut -f 1
If you want to try it with ipset
, you can do the following:
sudo su
apt -qq install iptables ipset
ipset -q flush ips
ipset -q create ips hash:net
for ip in $(curl --compressed https://raw.githubusercontent.com/scriptzteam/IP-BlockList-v4/master/ips.txt 2>/dev/null | grep -v "#" | grep -v -E "\s[1-2]$" | cut -f 1); do ipset add ips $ip; done
iptables -I INPUT -m set --match-set ips src -j DROP
In directory levels you can find preprocessed raw IP lists based on number of blacklist occurrences (e.g. levels/3.txt holds IP addresses that can be found on 3 or more blacklists). Wall of shame (2022-06-13)
IP | Number of (black)lists |
---|---|
162.247.74.74 | 9 |
107.152.217.2 | 9 |
171.25.193.25 | 9 |
45.155.204.3 | 8 |
103.251.167.21 | 8 |
89.234.157.254 | 8 |
144.172.73.16 | 8 |
185.220.101.4 | 8 |
185.220.103.118 | 8 |
46.19.137.50 | 8 |
185.220.100.254 | 8 |
192.42.116.16 | 8 |
162.247.74.27 | 8 |
116.98.162.249 | 8 |