Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

All of {AWS,Rackspace,Linode}? #9

Open
grimmfarmer opened this issue Nov 29, 2017 · 3 comments
Open

All of {AWS,Rackspace,Linode}? #9

grimmfarmer opened this issue Nov 29, 2017 · 3 comments

Comments

@grimmfarmer
Copy link

What methodology are you using to develop this list? The comments say the list consists of "IPs based on honeypot site visits by various bots." Are you finding that a preponderance of the included CIDRs from Rackspace, Linode, and AWS are engaging with your honeypots? If so, that may be supportable, depending upon sample size and methodology. But if this is simply a list of someone's hunches, it might be more appropriate as a greylist (i.e., "alert for human inspection") than a blacklist except, perhaps, for hobbyists and researchers. While I understand the temptation presented by the profile of colo/VPS providers in developing threat intel, it strikes me as inappropriate to include vast swaths of Rackspace's, AWS's, and Linode's IPv4 allocations. There is some legitimate business that goes on there (including mine).

@troubleshooter
Copy link

Seems Digital Ocean is also included as well.

@bengan
Copy link

bengan commented Jan 28, 2019

With all respect. As much as I like spam fighting I also dislike old rotten data that is no use to anyone. @pushinginertia you should take some time to go over your published blacklist. Also, since you started GDPR have taken effect and you're probably personally responsible for defaming a lot of sights in EU. I think the best you could do is to erase the list and start over.

@josenobile
Copy link

Bad Idea. I found a backup system stopped because this list blocks 52.192.0.0/11 that include AWS S3 endpoints, for example the IPs used by s3-1.amazonaws.com

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants