- complete rewrite of banIP to support nftables - all sets are handled in a separate nft table/namespace 'banIP' - for incoming blocking it uses the inet input hook, for outgoing blocking it uses the inet forward hook - full IPv4 and IPv6 support - supports nft atomic set loading - supports blocking by ASN numbers and by iso country codes - 42 preconfigured external feeds are available, plus local allow- and blocklist - supports local allow- and blocklist (IPv4, IPv6, CIDR notation or domain names) - auto-add the uplink subnet to the local allowlist - provides a small background log monitor to ban unsuccessful login attempts in real-time - the logterms for the log monitor service can be freely defined via regex - auto-add unsuccessful LuCI, nginx, Asterisk or ssh login attempts to the local blocklist - fast feed processing as they are handled in parallel as background jobs - per feed it can be defined whether the input chain or the forward chain should be blocked (default: both chains) - automatic blocklist backup & restore, the backups will be used in case of download errors or during startup - automatically selects one of the following download utilities with ssl support: aria2c, curl, uclient-fetch or wget - supports a 'allowlist only' mode, this option restricts internet access from/to a small number of secure websites/IPs - provides comprehensive runtime information - provides a detailed set report - provides a set search engine for certain IPs - feed parsing by fast & flexible regex rulesets - minimal status & error logging to syslog, enable debug logging to receive more output - procd based init system support (start/stop/restart/reload/status/report/search) - procd network interface trigger support - ability to add new banIP feeds on your own - add a readme with all available options/feeds to customize your installation to your needs - a new LuCI frontend will be available in due course Signed-off-by: Dirk Brenken <dev@brenken.org>
295 lines
16 KiB
Text
295 lines
16 KiB
Text
{
|
|
"adaway": {
|
|
"url_4": "https://raw.githubusercontent.com/dibdot/banIP-IP-blocklists/main/adaway-ipv4.txt",
|
|
"url_6": "https://raw.githubusercontent.com/dibdot/banIP-IP-blocklists/main/adaway-ipv6.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"rule_6": "/^(([0-9A-f]{0,4}:){1,7}[0-9A-f]{0,4}:?(\\/(1?[0-2][0-8]|[0-9][0-9]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"focus": "adaway IPs",
|
|
"descurl": "https://github.com/dibdot/banIP-IP-blocklists"
|
|
},
|
|
"adguard": {
|
|
"url_4": "https://raw.githubusercontent.com/dibdot/banIP-IP-blocklists/main/adguard-ipv4.txt",
|
|
"url_6": "https://raw.githubusercontent.com/dibdot/banIP-IP-blocklists/main/adguard-ipv6.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"rule_6": "/^(([0-9A-f]{0,4}:){1,7}[0-9A-f]{0,4}:?(\\/(1?[0-2][0-8]|[0-9][0-9]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"focus": "adguard IPs",
|
|
"descurl": "https://github.com/dibdot/banIP-IP-blocklists"
|
|
},
|
|
"adguardtrackers": {
|
|
"url_4": "https://raw.githubusercontent.com/dibdot/banIP-IP-blocklists/main/adguardtrackers-ipv4.txt",
|
|
"url_6": "https://raw.githubusercontent.com/dibdot/banIP-IP-blocklists/main/adguardtrackers-ipv6.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"rule_6": "/^(([0-9A-f]{0,4}:){1,7}[0-9A-f]{0,4}:?(\\/(1?[0-2][0-8]|[0-9][0-9]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"focus": "adguardtracker IPs",
|
|
"descurl": "https://github.com/dibdot/banIP-IP-blocklists"
|
|
},
|
|
"antipopads": {
|
|
"url_4": "https://raw.githubusercontent.com/dibdot/banIP-IP-blocklists/main/antipopads-ipv4.txt",
|
|
"url_6": "https://raw.githubusercontent.com/dibdot/banIP-IP-blocklists/main/antipopads-ipv6.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"rule_6": "/^(([0-9A-f]{0,4}:){1,7}[0-9A-f]{0,4}:?(\\/(1?[0-2][0-8]|[0-9][0-9]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"focus": "antipopads IPs",
|
|
"descurl": "https://github.com/dibdot/banIP-IP-blocklists"
|
|
},
|
|
"asn": {
|
|
"url_4": "https://asn.ipinfo.app/api/text/list/",
|
|
"url_6": "https://asn.ipinfo.app/api/text/list/",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"rule_6": "/^(([0-9A-f]{0,4}:){1,7}[0-9A-f]{0,4}:?(\\/(1?[0-2][0-8]|[0-9][0-9]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "ASN IPs",
|
|
"descurl": "https://asn.ipinfo.app"
|
|
},
|
|
"backscatterer": {
|
|
"url_4": "http://wget-mirrors.uceprotect.net/rbldnsd-all/ips.backscatterer.org.gz",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "backscatterer IPs",
|
|
"descurl": "https://www.uceprotect.net/en/index.php",
|
|
"flag": "gz"
|
|
},
|
|
"bogon": {
|
|
"url_4": "https://www.team-cymru.org/Services/Bogons/fullbogons-ipv4.txt",
|
|
"url_6": "https://www.team-cymru.org/Services/Bogons/fullbogons-ipv6.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"rule_6": "/^(([0-9A-f]{0,4}:){1,7}[0-9A-f]{0,4}:?(\\/(1?[0-2][0-8]|[0-9][0-9]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "bogon prefixes",
|
|
"descurl": "https://team-cymru.com"
|
|
},
|
|
"cinsscore": {
|
|
"url_4": "https://cinsscore.com/list/ci-badguys.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "suspicious attacker IPs",
|
|
"descurl": "https://cinsscore.com/#list"
|
|
},
|
|
"country": {
|
|
"url_4": "https://www.ipdeny.com/ipblocks/data/aggregated/",
|
|
"url_6": "https://www.ipdeny.com/ipv6/ipaddresses/aggregated/",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"rule_6": "/^(([0-9A-f]{0,4}:){1,7}[0-9A-f]{0,4}:?(\\/(1?[0-2][0-8]|[0-9][0-9]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "country blocks",
|
|
"descurl": "http://www.ipdeny.com/ipblocks"
|
|
},
|
|
"darklist": {
|
|
"url_4": "https://darklist.de/raw.php",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "suspicious attacker IPs",
|
|
"descurl": "https://darklist.de"
|
|
},
|
|
"debl": {
|
|
"url_4": "https://www.blocklist.de/downloads/export-ips_all.txt",
|
|
"url_6": "https://www.blocklist.de/downloads/export-ips_all.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"rule_6": "/^(([0-9A-f]{0,4}:){1,7}[0-9A-f]{0,4}:?(\\/(1?[0-2][0-8]|[0-9][0-9]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "fail2ban IP blacklist",
|
|
"descurl": "https://www.blocklist.de"
|
|
},
|
|
"doh": {
|
|
"url_4": "https://raw.githubusercontent.com/dibdot/DoH-IP-blocklists/master/doh-ipv4.txt",
|
|
"url_6": "https://raw.githubusercontent.com/dibdot/DoH-IP-blocklists/master/doh-ipv6.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"rule_6": "/^(([0-9A-f]{0,4}:){1,7}[0-9A-f]{0,4}:?(\\/(1?[0-2][0-8]|[0-9][0-9]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"focus": "public DoH-Provider",
|
|
"descurl": "https://github.com/dibdot/DoH-IP-blocklists"
|
|
},
|
|
"drop": {
|
|
"url_4": "https://www.spamhaus.org/drop/drop.txt",
|
|
"url_6": "https://www.spamhaus.org/drop/dropv6.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"rule_6": "/^(([0-9A-f]{0,4}:){1,7}[0-9A-f]{0,4}:?(\\/(1?[0-2][0-8]|[0-9][0-9]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"focus": "spamhaus drop compilation",
|
|
"descurl": "https://www.spamhaus.org"
|
|
},
|
|
"dshield": {
|
|
"url_4": "https://feeds.dshield.org/block.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)[[:space:]]/{printf \"%s/%s,\\n\",$1,$3}",
|
|
"focus": "dshield IP blocklist",
|
|
"descurl": "https://www.dshield.org"
|
|
},
|
|
"edrop": {
|
|
"url_4": "https://www.spamhaus.org/drop/edrop.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"focus": "spamhaus edrop compilation",
|
|
"descurl": "https://www.spamhaus.org"
|
|
},
|
|
"feodo": {
|
|
"url_4": "https://feodotracker.abuse.ch/downloads/ipblocklist.txt",
|
|
"rule_4": "BEGIN{RS=\"\\r\\n\"}/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "feodo tracker",
|
|
"descurl": "https://feodotracker.abuse.ch"
|
|
},
|
|
"firehol1": {
|
|
"url_4": "https://iplists.firehol.org/files/firehol_level1.netset",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "firehol level 1 compilation",
|
|
"descurl": "https://iplists.firehol.org/?ipset=firehol_level1"
|
|
},
|
|
"firehol2": {
|
|
"url_4": "https://iplists.firehol.org/files/firehol_level2.netset",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "firehol level 2 compilation",
|
|
"descurl": "https://iplists.firehol.org/?ipset=firehol_level2"
|
|
},
|
|
"firehol3": {
|
|
"url_4": "https://iplists.firehol.org/files/firehol_level3.netset",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "firehol level 3 compilation",
|
|
"descurl": "https://iplists.firehol.org/?ipset=firehol_level3"
|
|
},
|
|
"firehol4": {
|
|
"url_4": "https://iplists.firehol.org/files/firehol_level4.netset",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{if(!seen[$1]++)printf \"%s,\\n\",$1}",
|
|
"focus": "firehol level 4 compilation",
|
|
"descurl": "https://iplists.firehol.org/?ipset=firehol_level4"
|
|
},
|
|
"greensnow": {
|
|
"url_4": "https://blocklist.greensnow.co/greensnow.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "suspicious server IPs",
|
|
"descurl": "https://greensnow.co"
|
|
},
|
|
"iblockads": {
|
|
"url_4": "https://list.iblocklist.com/?list=dgxtneitpuvgqqcpfulq&fileformat=cidr&archiveformat=gz",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "advertising IPs",
|
|
"descurl": "https://www.iblocklist.com",
|
|
"flag": "gz",
|
|
"login": true
|
|
},
|
|
"iblockspy": {
|
|
"url_4": "https://list.iblocklist.com/?list=llvtlsjyoyiczbkjsxpf&fileformat=cidr&archiveformat=gz",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "malicious spyware IPs",
|
|
"descurl": "https://www.iblocklist.com",
|
|
"flag": "gz",
|
|
"login": true
|
|
},
|
|
"myip": {
|
|
"url_4": "https://myip.ms/files/blacklist/general/latest_blacklist.txt",
|
|
"url_6": "https://myip.ms/files/blacklist/general/latest_blacklist.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"rule_6": "/^(([0-9A-f]{0,4}:){1,7}[0-9A-f]{0,4}:?(\\/(1?[0-2][0-8]|[0-9][0-9]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"focus": "real-time IP blocklist",
|
|
"descurl": "https://myip.ms"
|
|
},
|
|
"nixspam": {
|
|
"url_4": "https://www.nixspam.net/download/nixspam-ip.dump.gz",
|
|
"rule_4": "/(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)[[:space:]]/{printf \"%s,\\n\",$2}",
|
|
"focus": "iX spam protection",
|
|
"descurl": "https://www.nixspam.net",
|
|
"flag": "gz"
|
|
},
|
|
"oisdnsfw": {
|
|
"url_4": "https://raw.githubusercontent.com/dibdot/banIP-IP-blocklists/main/oisdnsfw-ipv4.txt",
|
|
"url_6": "https://raw.githubusercontent.com/dibdot/banIP-IP-blocklists/main/oisdnsfw-ipv6.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"rule_6": "/^(([0-9A-f]{0,4}:){1,7}[0-9A-f]{0,4}:?(\\/(1?[0-2][0-8]|[0-9][0-9]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"focus": "OISD-nsfw IPs",
|
|
"descurl": "https://github.com/dibdot/banIP-IP-blocklists"
|
|
},
|
|
"oisdsmall": {
|
|
"url_4": "https://raw.githubusercontent.com/dibdot/banIP-IP-blocklists/main/oisdsmall-ipv4.txt",
|
|
"url_6": "https://raw.githubusercontent.com/dibdot/banIP-IP-blocklists/main/oisdsmall-ipv6.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"rule_6": "/^(([0-9A-f]{0,4}:){1,7}[0-9A-f]{0,4}:?(\\/(1?[0-2][0-8]|[0-9][0-9]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"focus": "OISD-small IPs",
|
|
"descurl": "https://github.com/dibdot/banIP-IP-blocklists"
|
|
},
|
|
"proxy": {
|
|
"url_4": "https://iplists.firehol.org/files/proxylists.ipset",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "open proxies",
|
|
"descurl": "https://iplists.firehol.org/?ipset=proxylists"
|
|
},
|
|
"sslbl": {
|
|
"url_4": "https://sslbl.abuse.ch/blacklist/sslipblacklist.csv",
|
|
"rule_4": "BEGIN{FS=\",\"}/(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)/{printf \"%s,\\n\",$2}",
|
|
"focus": "SSL botnet IPs",
|
|
"descurl": "https://sslbl.abuse.ch"
|
|
},
|
|
"stevenblack": {
|
|
"url_4": "https://raw.githubusercontent.com/dibdot/banIP-IP-blocklists/main/stevenblack-ipv4.txt",
|
|
"url_6": "https://raw.githubusercontent.com/dibdot/banIP-IP-blocklists/main/stevenblack-ipv6.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"rule_6": "/^(([0-9A-f]{0,4}:){1,7}[0-9A-f]{0,4}:?(\\/(1?[0-2][0-8]|[0-9][0-9]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"focus": "stevenblack IPs",
|
|
"descurl": "https://github.com/dibdot/banIP-IP-blocklists"
|
|
},
|
|
"talos": {
|
|
"url_4": "https://www.talosintelligence.com/documents/ip-blacklist",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "talos IPs",
|
|
"descurl": "https://talosintelligence.com/reputation_center"
|
|
},
|
|
"threat": {
|
|
"url_4": "https://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "emerging threats",
|
|
"descurl": "https://rules.emergingthreats.net"
|
|
},
|
|
"threatview": {
|
|
"url_4": "https://threatview.io/Downloads/IP-High-Confidence-Feed.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "malicious IPs",
|
|
"descurl": "https://threatview.io"
|
|
},
|
|
"tor": {
|
|
"url_4": "https://raw.githubusercontent.com/SecOps-Institute/Tor-IP-Addresses/master/tor-exit-nodes.lst",
|
|
"url_6": "https://raw.githubusercontent.com/SecOps-Institute/Tor-IP-Addresses/master/tor-exit-nodes.lst",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"rule_6": "/^(([0-9A-f]{0,4}:){1,7}[0-9A-f]{0,4}:?(\\/(1?[0-2][0-8]|[0-9][0-9]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "tor exit nodes",
|
|
"descurl": "https://github.com/SecOps-Institute/Tor-IP-Addresses"
|
|
},
|
|
"uceprotect1": {
|
|
"url_4": "http://wget-mirrors.uceprotect.net/rbldnsd-all/dnsbl-1.uceprotect.net.gz",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "spam protection level 1",
|
|
"descurl": "http://www.uceprotect.net/en/index.php",
|
|
"flag": "gz"
|
|
},
|
|
"uceprotect2": {
|
|
"url_4": "http://wget-mirrors.uceprotect.net/rbldnsd-all/dnsbl-2.uceprotect.net.gz",
|
|
"rule_4": "BEGIN{IGNORECASE=1}/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)([[:space:]]NET)/{printf \"%s,\\n\",$1}",
|
|
"focus": "spam protection level 2",
|
|
"descurl": "http://www.uceprotect.net/en/index.php",
|
|
"flag": "gz"
|
|
},
|
|
"uceprotect3": {
|
|
"url_4": "http://wget-mirrors.uceprotect.net/rbldnsd-all/dnsbl-3.uceprotect.net.gz",
|
|
"rule_4": "BEGIN{IGNORECASE=1}/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)([[:space:]]YOUR)/{printf \"%s,\\n\",$1}",
|
|
"focus": "spam protection level 3",
|
|
"descurl": "http://www.uceprotect.net/en/index.php",
|
|
"flag": "gz"
|
|
},
|
|
"urlhaus": {
|
|
"url_4": "https://urlhaus.abuse.ch/downloads/ids/",
|
|
"rule_4": "match($0,/(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5]))/){printf \"%s,\\n\",substr($0,RSTART,RLENGTH)}",
|
|
"focus": "urlhaus IDS IPs",
|
|
"descurl": "https://urlhaus.abuse.ch"
|
|
},
|
|
"urlvir": {
|
|
"url_4": "https://iplists.firehol.org/files/urlvir.ipset",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "malware related IPs",
|
|
"descurl": "https://iplists.firehol.org/?ipset=urlvir"
|
|
},
|
|
"voip": {
|
|
"url_4": "https://voipbl.org/update/",
|
|
"rule_4": "BEGIN{RS=\"(([0-9]{1,3}\\\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)\"}{if(RT)printf \"%s,\\n\",RT}",
|
|
"focus": "VoIP fraud blocklist",
|
|
"descurl": "https://voipbl.org"
|
|
},
|
|
"webclient": {
|
|
"url_4": "https://iplists.firehol.org/files/firehol_webclient.netset",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)$/{printf \"%s,\\n\",$1}",
|
|
"focus": "malware related IPs",
|
|
"descurl": "https://iplists.firehol.org/?ipset=firehol_webclient"
|
|
},
|
|
"yoyo": {
|
|
"url_4": "https://raw.githubusercontent.com/dibdot/banIP-IP-blocklists/main/yoyo-ipv4.txt",
|
|
"url_6": "https://raw.githubusercontent.com/dibdot/banIP-IP-blocklists/main/yoyo-ipv6.txt",
|
|
"rule_4": "/^(([0-9]{1,3}\\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])(\\/(1?[0-9]|2?[0-9]|3?[0-2]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"rule_6": "/^(([0-9A-f]{0,4}:){1,7}[0-9A-f]{0,4}:?(\\/(1?[0-2][0-8]|[0-9][0-9]))?)[[:space:]]/{printf \"%s,\\n\",$1}",
|
|
"focus": "yoyo IPs",
|
|
"descurl": "https://github.com/dibdot/banIP-IP-blocklists"
|
|
}
|
|
}
|