/malicious_ip_addresses

Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space

Malicious IP Addresses

These are the IP addresses of the most active Botnets/Zombies/Scanners in European Cyber Space

⚠Since these are malicious IP addresses that are bumping, you need to create rules based on WAN to LAN⚠

Support our work with a donation 👉 https://www.paypal.com/donate/?hosted_button_id=8GBRAM5CU57S4

All lists available

blacklist_ips_for_fortinet_firewall_aa.txt

blacklist_ips_for_fortinet_firewall_ab.txt

botnets_zombies_scanner_spam_ips.txt (full list)

Categories

  • SSH Brute Forcers
  • FortiOS CVE | RCE Exploits
  • Exchange CVE | RCE Exploits
  • VPN-SSL Brute Forcers
  • C2 Cobalt Strike
  • CGI Script Scanner
  • Cisco ASA Scanner
  • MSSQL Bruteforcer
  • GPON CVE-2018-10561 Router Worm
  • GPON CVE-2018-10562 Router Worm
  • SSH Worm
  • VMware ESXi Scanner
  • RDP Worm
  • Grafana API_JSONRPC.PHP Zabbix Credentials Disclosure
  • WordPress Core User Enumeration
  • Ivanti EPMM (MobileIron Core) Authentication Bypass
  • Huawei HG532 UPnP CVE-2017-17215 Worm
  • Open Proxy Scanner
  • QNX Qconn Exploit
  • ProxyLogon SSRF Vuln Check
  • Atlassian Confluence Server Privilege Escalation
  • Shodan Scanners
  • Stretchoid Scanner
  • XWorm MaaS (IoC)
  • CVE-2023-22518 Exploitation
  • NjRat
  • QaKBot
  • Malware
  • Mirai

Etc.

Update

I have created specific lists for Fortinet firewall users following the limitation set by Fortinet:

blacklist_ips_for_fortinet_firewall_aa.txt

blacklist_ips_for_fortinet_firewall_ab.txt

  • etc.

Also, you will need to fork the list and split it into 130,000 entries per file. In this way, you can validate it in your Threat feeds of your Fortinet Firewall.

PS: this list will be updated every 24/48h