Skip to content
/ IPs Public

Discover various IP lists for effective blocking. Utilize data from HoneyPots to enhance your security. πŸŒπŸ”’ Download the latest release on GitHub!

Sinan231/IPs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

3 Commits
Β 
Β 

Repository files navigation

IP Block Lists for Enhanced Security Against Threats 🚫

GitHub Repo Stars GitHub Repo Forks GitHub License

Overview

This repository provides IP block lists designed to protect your systems from various online threats. The lists target malicious entities such as malware, bots, hackers, and sniffers. By using these block lists, you can enhance your security measures and reduce the risk of attacks.

Features

  • Comprehensive Coverage: The lists cover a wide range of threats, including botnets and brute-force attacks.
  • Regular Updates: We update the lists regularly to include the latest malicious IPs.
  • Compatibility: Works seamlessly with tools like Fail2Ban, iptables, and ipset.

Topics Covered

  • Blocklist: A collection of IPs known for malicious activity.
  • Botnet: Identifies IPs associated with botnet operations.
  • Brute-Force: Targets IPs that engage in brute-force attacks.
  • CNC: Addresses command and control server IPs.
  • Compromised: Lists IPs of compromised devices.
  • Security: Enhances overall network security.

Getting Started

To begin using the IP block lists, you can download the latest release from the Releases section. After downloading, follow the instructions provided in the release notes to execute the necessary commands for implementation.

Installation Steps

  1. Download the Latest Release:

  2. Extract the Files:

    • Use your preferred method to extract the downloaded files.
  3. Implement the Block Lists:

    • Follow the instructions in the release notes for executing the block lists with your firewall or security tools.

Example Usage

Here’s how you can use the IP block lists with iptables:

# Load the block list into iptables
iptables -A INPUT -s <IP_ADDRESS> -j DROP

Replace <IP_ADDRESS> with the actual IP you want to block.

Integration with Security Tools

Fail2Ban

Fail2Ban is a great tool to use alongside these block lists. You can configure it to automatically ban IPs that show malicious behavior.

  1. Install Fail2Ban:

    sudo apt-get install fail2ban
  2. Configure Fail2Ban:

    • Add the block lists to the configuration file.

Iptables

Iptables allows you to manage network traffic effectively. You can load the block lists directly into iptables to prevent unwanted access.

IPSet

IPSet can be used to manage large sets of IP addresses efficiently. You can load the block lists into IPSet and then apply them to iptables.

Block List Format

The block lists are provided in a simple text format, making it easy to integrate into your existing systems. Each line contains a single IP address or CIDR notation.

Example Block List

192.0.2.0/24
203.0.113.5
198.51.100.0/24

Contributing

We welcome contributions from the community. If you have suggestions or would like to add to the block lists, please follow these steps:

  1. Fork the Repository: Click on the "Fork" button at the top right corner of the page.
  2. Create a New Branch:
    git checkout -b feature/your-feature-name
  3. Make Your Changes: Add your IPs or modify the existing lists.
  4. Commit Your Changes:
    git commit -m "Add new IPs to block list"
  5. Push to Your Branch:
    git push origin feature/your-feature-name
  6. Create a Pull Request: Go to the original repository and submit a pull request.

License

This project is licensed under the MIT License. See the LICENSE file for details.

Support

If you encounter any issues or have questions, feel free to open an issue in the repository. We appreciate your feedback and aim to provide timely responses.

Related Resources

Additional Links

For more information, check the Releases section for the latest updates and files.

Visual Representation

Security Shield

This image represents the security that comes with using effective block lists. It serves as a reminder of the importance of safeguarding your network.

Conclusion

By utilizing the IP block lists provided in this repository, you can significantly enhance your security posture. Regular updates and integration with popular security tools ensure that you stay protected against evolving threats.

Remember to keep an eye on the Releases section for the latest updates.

About

Discover various IP lists for effective blocking. Utilize data from HoneyPots to enhance your security. πŸŒπŸ”’ Download the latest release on GitHub!

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •