Skip to content

duggytuxy/Data-Shield_IPv4_Blocklist

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 

Repository files navigation

Data-Shield IPv4 Blocklist - Block malicious IP addresses

Open Source Made with ❤️ Fortinet Palo Alto pfSense OPNsense No False Positive Last update

About this project 🧪

This project (blocking list) aims to reduce the number of attacks by inserting IP addresses known to be abusive, aggressive and malicious (confidence of abuse 100%).

This blocklist is made up of reliable, high-quality data from decoys placed geolocally in public and private infrastructures such as :

Country🌍 OS🖥️ Technologies🎛️ Online🛜
Belgium GNU/Linux SMB, Apache, Wordpress, VPN-SSL On
Germany GNU/Linux VPN-SSL, Nginx, Squid, SMB On
Austria WinSrv 2022 Apache, IIS, SMB, DC On
Netherlands WinSrv 2022 Apache, SMB, DC On
France GNU/Linux VPN-SSL, SMB, CVEs, Wordpress On
Spain WinSrv 2025 IIS, Apache, SMB, DC On
Portugal GNU/Linux DNS, Squid, Wireguard On
Italy GNU/Linux Apache, Nginx, Wordpress, Webmin On
Greece GNU/Linux VPN-SSL, CVEs On
Lithuania GNU/Linux CVEs, SMB, Squid, OpenVPN On

What's special about these decoys is that they contain several configurations, depending on the IS mapping and the specific needs of the customer or the data I want to collect, so I can correlate them with other CTI platforms

  • To give you a few figures, I collect (on average) over 7195 IP addresses unique per day, and after analysis and feedback, once they're really reliable, I add them to this blocking list, which is closely monitored 24/7.
  • For the deletion part, the policy in force is that I keep these IP addresses for 30 days: if no activity has been reported within this period, these IP addresses are removed from the blocking list to be inserted in a “Whitelist” also monitored.

PS: I want to make it clear that this block list is an additional layer of protection to :

  • Reduce the number of attacks
  • Reduce the possibility of mapping your exposed assets (public IPs)
  • Slightly reduce the attack surface (e.g. Recon)

🫸But under no circumstances will it replace all the best practices in your security posture.

A few highlights 🧱

  • Some IP addresses have a relatively short lifespan (such as APTs, groups that deploy infostealers and malware, etc.).
  • 👇Here are some of the vectors and types of attack these IP addresses can inflict at any given time👇.

CVEs 🔩

CVE🐞 Description📜 Link🌍
CVE-2020-25078 An issue was discovered on D-Link DCS-2530L... NIST Website
CVE-2021-42013 It was found that the fix for CVE-2021-41773... NIST Website
CVE-2021-41773 A flaw was found in a change made to path... NIST Website
CVE-2024-3400 PAN-OS : A command injection as a result... NIST Website
CVE-2017-16894 In Laravel framework through 5.5.21... NIST Website
CVE-2024-3721 A vulnerability was found in TBK DVR-4104 and DVR-4216... NIST Website
CVE-2022-30023 Tenda ONT GPON AC1200 Dual band WiFi HG9 v1.0.1... NIST Website
CVE-2017-9841 Util/PHP/eval-stdin.php in PHPUnit before 4.8.28... NIST Website
CVE-2018-10561 An issue was discovered on Dasan GPON home routers... NIST Website
CVE-2018-20062 An issue was discovered in NoneCms V1.3... NIST Website
CVE-2022-44808 Vulnerability has been found on D-Link DIR-823G devices... NIST Website
CVE-2022-41040 Microsoft Exchange Server Elevation of PV** NIST Website
CVE-2022-41082 Microsoft Exchange Server RCE Vulnerability** NIST Website

Etc.

TTPs 🐞

TTPs🥷 A few countries of origin🌍 Avg IP addr per day🛜
Apache Attack Belgium, UK, Poland, Russia NC
Nginx Attack Brazil, USA, France, China NC
Ransomware Attack Brazil, Lithuania, Russia NC
VPN Attack Belgium, UK, Poland, Russia NC
RDP Attack USA, Brazil, Peru, Morocco NC
NTLM Attack China, UK, Poland, Belgium NC
Kerberos Attack Venezuela, Brazil, Poland, Algeria NC
Wordpress Enumeration USA, China, Russia, UK NC
Botnet Recruitment USA, China, Brazil, Chile NC
Brute-force Attack USA, China, UK, France NC
Brute-Force SSH Login USA, China, Poland, Netherlands NC
Directory Busting USA, China, Italy, India NC
Credentials Dumping India, Japan, UK, Netherlands NC
Email Attack USA, China, India, Spain NC
SMB Attack USA, China, Poland, France NC
FTP Attack UK, France, Poland, Vietnam NC
IMAP Attack USA, China, Poland, France NC
Information Gathering USA, China, India, Lithuania NC
Remote Code Execution USA, India, Pakistan, Iran NC
Scanning USA, China, India, Indonesia NC
SSH Attack USA, China, India, France NC
Tor Exit Node Switzerland, France, Germany NC
Tor Node Switzerland, France, Germany NC
VOIP Attack Belgium, India, Vietnam, Indonesia NC
Web Traversal USA, China, Lithuania, France NC

Etc.

PS: this list will be updated every 4/24h

Tips 💡

  • You can easily integrate this list into your FWs under the Inbound/Outbound policy rules, Threat feeds.
  • To add my blocklist to the Fortinet, CheckPoint, Palo Alto and OPNsense FWs, here are some interesting links
Vendor🧱 Description📜 Link🌍
Fortinet External blocklist policy Fortinet Website
Checkpoint IP Block Feature Checkpoint Website
Palo Alto Configure the Firewall to Access an External Dynamic List Palo Alto Website
OPNsense OPNsense : Block malicious IPs Slash-Root Website

A few figures 🎖️

According to feedback, more than 70 small and medium-sized companies (Acensi as well) have already implemented this list in their FW Fortinet, Palo Alto, Checkpoint, etc.

Support my work with a donation 🙏

Site📍 Description📜 Link🌍
Ko-Fi Join all types of creators getting donations, memberships, etc. from their fans! Thank you !!!

Data-Shield IPv4 Blocklist © 2023 by Duggy Tuxy is licensed License File