forked from sidallocation/sidallocation.org
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathallocations.yml
More file actions
152 lines (134 loc) · 3.77 KB
/
allocations.yml
File metadata and controls
152 lines (134 loc) · 3.77 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
meta:
title: Sid Allocation
preamble: |
**Mission statement**: a working group to self organize sid ranges for the benefit of users
allocations:
local:
org: local
name: Reserved for local use. Put your custom rules in this range.
note: Reserved for Local Use - Put your custom rules in this range to avoid conflicts
ranges:
- start: 1000000
size: 1000000
emergingthreats/open:
org: Emerging Threats
name: Emerging Threats Open
url: https://community.emergingthreats.net/
note: "[Emerging Threats Open](https://community.emergingthreats.net/)"
ranges:
- start: 2000000
size: 104000
- start: 2400000
size: 210000
oisf/core:
org: OISF
name: Suricata Engine Rules
note: Suricata Engine Events
ranges:
- start: 2200000
size: 100000
travisbgreen/hunting:
org: Travis Green
name: Hunting Ruleset
url: https://github.com/travisbgreen/hunting-rules
note: "[Hunting Ruleset](https://github.com/travisbgreen/hunting-rules)"
ranges:
- start: 2610000
size: 10000
emergingthreats:
org: Emerging Threats
name: Emerging Threats
note: "[Emerging Threats](https://doc.emergingthreats.net/bin/view/Main/SidAllocation)"
ranges:
- start: 2700000
size: 100000
- start: 100000000
size: 100000000
emergingthreats/pro:
org: Emerging Threats
name: Emerging Threats Pro
note: "[Emerging Threats Pro](https://doc.emergingthreats.net/bin/view/Main/SidAllocation)"
ranges:
- start: 2800000
size: 100000
corelight:
org: Corelight
name: Corelight
note: "[Corelight Github](https://github.com/corelight/)"
ranges:
- start: 3000000
size: 100000
stamusnetworks:
org: Stamus Networks
name: Stamus Networks
note: "[Stamus Networks Detection](https://stamus-networks.com)"
ranges:
- start: 3100000
size: 100000
dcso:
org: DCSO
name: DCSO
note: "[DCSO CyTec](https://medium.com/@DCSO_CyTec), [DCSO Github](https://github.com/DCSO/suricata-rules)"
ranges:
- start: 3200000
size: 100000
extrahopnetworks:
org: ExtraHop
name: ExtraHop
note: "[ExtraHop IDS](https://www.extrahop.com/solutions/security/ids/)"
ranges:
- start: 4000000
size: 100000
etnetera:
org: Etnetera a.s.
name: Etnetera a.s.
note: "[Etnetera aggressive IP blacklist](https://security.etnetera.cz/feeds/etn_aggressive.rules)"
ranges:
- start: 5000000
size: 214
julioliraup:
org: Julioliraup
name: Julioliraup Antiphishing
note: "[Antiphishing](https://github.com/julioliraup/Antiphishing)"
ranges:
- start: 6000000
size: 100000
positivetechnologies:
org: Positive Technologies
name: Positive Technologies Attack Detection Team ruleset
note: "[PT Security Attack Detection Team ruleset](https://github.com/ptresearch/AttackDetection#sid-range)"
ranges:
- start: 10000000
size: 2000000
jpgview:
org: jpgview
name: DOH rules
note: "[DOH Rules](https://raw.githubusercontent.com/jpgpi250/piholemanual/master/DOH/DOH.rules)"
ranges:
- start: 27990000
size: 10000
abusech:
org: Abuse.ch
name: Abuse.ch
note: "Abuse.ch"
ranges:
- start: 902200000
size: 4000097
pawpatrules:
org: Pawpatrules
name: PAW Patrules
note: "[PAW Patrules](https://pawpatrules.fr/)"
engine:
- suricata
ranges:
- start: 3300000
size: 100000
aleksibovellan:
org: Aleksi Bovellan
name: Aleksi Bovellan
note: "[NMAP Ruleset](https://github.com/aleksibovellan/opnsense-suricata-nmaps)"
engine:
- suricata
ranges:
- start: 3400000
size: 100000