I played around with IP reputation and CDB a while back, but never pushed it to my live servers. I found the following bash snippet on my test server, it may be of use for someone (although the alienvault list is pretty long and contains different levels of "evil" may be worth parsing and splitting up).

#!/bin/bash
{
  curl "https://zeustracker.abuse.ch/blocklist.php?download=ipblocklist"; |\
  egrep "^[0-9]" | awk '{print $1":ZeuS IP blocklist"}'

  curl "https://reputation.alienvault.com/reputation.generic"; |\
  egrep "^[0-9]" | cut -d, -f1 | sed 's/ # /:/'

} > ip_blacklist


On 7/24/2015 7:46 PM, Santiago Bassett wrote:
Hi Theresa,

my guess is that you are probably victim of web crawlers more than anything else. In any case it would be interesting to search those source IPs info in IP reputation databases to see if those are well known attackers.

Has anyone in this list use an IP reputation database in a CDB list? I would probably try something like that and see how it goes.

Best



On Fri, Jul 24, 2015 at 12:32 PM, theresa mic-snare <[email protected] <mailto:[email protected]>> wrote:

    hi folks,

    i need some help with intepreting webserver logfiles (apache logs).
    while setting up my ossec-test environment for my thesis project,
    I've also setup a wordpress on an apache webserver as a
    "honeypot". although there's no real content, except the standard
    wordpress posts & pages that comes with the installation, I
    already have some "visitors". I see these dubious looking
    requests. I'm not sure if these are threats/attacks against my
    wordpress installation.
    I'm not really familiar with apache logs, but I need some
    threats/attacks to explain in my thesis. I thought this would be
    the best way to get started.

    I have PLENTY of the following requests in my httpd logs

    |
    SrcIP:115.239.228.8
    115.239.228.8--[24/Jul/2015:19:22:42+0200]"GET
    http://zc.qq.com/cgi-bin/common/attr?id=260714&r=0.7636925813952972 
HTTP/1.1"404292"-""Mozilla/5.0
    (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; 360SE)"

    |

    Judging by the HTTP status code it's not really a threat, right?
    it's probaly just some hacker with a tool who's looking for
    vulnerabilities? or is this just nonsense/junk?

    |
    ReceivedFrom:tron->/var/log/httpd/access_log
    Rule:31515fired (level 6)->"PHPMyAdmin scans (looking for setup.php)."
    Portionof the log(s):

    178.33.154.144--[24/Jul/2015:11:55:15+0200]"GET
    /phpMyAdmin/scripts/setup.php HTTP/1.1"403309"-""-"
    |

    also this
    |
    ReceivedFrom:tron->/var/log/httpd/access_log
    Rule:31101fired (level 5)->"Web server 400 error code."
    Portionof the log(s):

    202.137.235.243--[24/Jul/2015:07:34:11+0200]"HEAD
    /ossec-wui/index.php HTTP/1.1"401-"-""-"
    |

    i'm surprised they found out about it.....glad i protected it with
    htaccess and they didn't come in. ;)

    and lots of other requests that return HTTP 403 (forbidden) or 404
    (not found)

    i'm not quite sure what to make of it.
    i didn't realise my server was so exposed....did they just find
    the IP by scanning for http ports?!

    looking to some feedback,
    theresa
--
    ---
    You received this message because you are subscribed to the Google
    Groups "ossec-list" group.
    To unsubscribe from this group and stop receiving emails from it,
    send an email to [email protected]
    <mailto:[email protected]>.
    For more options, visit https://groups.google.com/d/optout.


--

---
You received this message because you are subscribed to the Google Groups "ossec-list" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected] <mailto:[email protected]>.
For more options, visit https://groups.google.com/d/optout.

--

--- You received this message because you are subscribed to the Google Groups "ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to