今日红队ip库,文章每日更新
请在https://www.secshi.com/41563.html评论区留言威胁情报,将会选取用户送出定制鼠标垫!
链接: https://pan.baidu.com/s/1H_quIAqVQyAtVFLblW995w 提取码: u3uf
信息同步:以下恶意IP请重点关注,本地若匹配命中,请及时封禁。
恶意IP如下:
39.156.57.0/24
39.101.xx.xx – 39.107.xx.xx
81.68.167.xx
81.68.168.xx
81.68.169.xx
81.68.170.xx
81.68.167.75有命中
如因封禁IP导致业务问题产生影响自负!!!
红队IP:
154.85.191.30
139.162.114.82
47.91.42.223
61.14.210.152
139.162.196.207
81.68.168.223
81.68.169.72
81.68.167.29
81.68.170.78
81.68.168.250
重点观察IP:
39.156.57.0/24
39.101 – 39.107
攻击ip:
81.68.168.223
81.68.169.72
81.68.167.29
81.68.170.78
81.68.168.250
81.68.173.7
154.85.191.30
139.162.114.82
47.91.42.223
61.14.210.152
139.162.196.207
81.68.168.223
81.68.169.72
81.68.167.29
81.68.170.78
81.68.168.250
81.68.173.7
【友商共享】重点观察IP:
39.156.57.0/24
39.101 – 39.107
确认是攻击队的,可安排着重关注
39.101.141.152
114.247.103.116
121.234.236.193
49.89.250.166
114.239.16.18
49.89.242.53
114.239.104.49
114.239.17.136
114.239.176.240
其他单位已封IP(确定红队)
通知类型:攻击队IP地址通知
处置需求:重点关注
通知内容:以下为确认是攻击队的地址段,不可大段封禁,可安排着重关注
39.156.57.0/24
39.101.0.0/16
39.102.0.0/16
39.103.0.0/16
39.104.0.0/16
39.105.0.0/16
39.106.0.0/16
39.107.0.0/16
[威胁情报]一级预警,现场防守的同学注意,某些版本的网络连接测试工具、客户端等,可能存在远程溢出漏洞,不要在个人电脑尝试连接攻击者的端口,如需要测试端口联通性,一定要在充分隔离的测试虚拟机内尝试。你连接的可能不是对方的桌面,而是攻击方的蜜罐
【综合情报,能源央企蜜罐系统发现以下攻击者IP】
58.218.66.190
122.155.161.107
122.51.16.221
180.76.121.81
47.56.187.209
42.3.24.62
117.136.0.139
攻击方式:针对mysql、redis、weblogic、vpn服务的攻击。
223.104.3.24
vps:115.113.16.226
81.68.168.223
81.68.169.72
81.68.167.29
81.68.170.78
81.68.170.78
81.68.168.250
81.68.173.7
【综合情报,蜜罐系统发现以下攻击者IP】
139.162.66.65
14.187.74.248
189.111.74.178
173.255.211.252
223.105.4.250
42.90.92.205
119.147.46.133
119.147.46.158
情报共享(确定红队):114.247.103.116
121.234.236.193
49.89.250.166
114.239.16.18
49.89.242.53
114.239.104.49
114.239.17.136
114.239.176.240
81.68.168.223
81.68.169.72
81.68.167.29
81.68.170.78
81.68.168.250
81.68.173.7
122.51.247.192
221.6.148.178
60.8.123.29
222.163.80.27
157.185.156.181
115.238.246.74
218.98.14.7
这几个 后门扫描
标题:XX信x擎EDR管理服务器远程命令执行RCE漏洞
威胁等级:严重
影响范围:使用XX信天擎EDR产品的主机
漏洞描述:暂时不详
说明:该漏洞通过XX服SSL VPN进入内网后,利用这类漏洞控制所有装有edr的机器
攻击IP:
180.126.244.114
110.183.243.11
52.81.95.61
180.126.244.114
111.225.149.121
8.210.153.101
220.168.95.163
220.168.95.161
171.125.18.60
106.75.175.61
129.28.113.46
61.156.113.10
42.248.93.10
116.236.2.254
222.64.84.106
218.3.172.102
43.248.186.159攻击ip:118.24.46.15
118.24.53.251
154.214.28.66
117.136.0.214
185.223.166.11
101.67.19.173
36.5.185.236
36.5.185.177
43.243.222.111
39.101.137.225
47.106.204.157
220.243.135.29
111.225.148.137
175.44.42.248
3.14.145.58
60.8.123.143
119.45.135.186
180.126.244.114
119.45.232.251
110.249.202.96
220.243.135.58
110.249.202.97
106.53.242.23
116.62.27.47
111.225.148.155
114.247.103.116
114.247.103.116
111.225.149.141
110.249.202.48
47.103.145.218
110.249.202.39
111.225.149.78
111.225.149.225
119.45.238.40
106.14.14.76
60.12.124.24
60.8.123.73
143.92.32.108
13.235.59.127
51.132.243.116
111.225.149.248
176.110.35.154
77.247.108.40
186.167.2.35
117.30.36.207
122.14.218.133
122.14.218.133
122.14.218.133
122.14.218.133
122.14.218.133
122.14.218.133
122.14.218.133
122.14.218.133
122.14.218.133
122.14.218.133
122.14.218.133
122.14.218.133
122.14.218.133
122.14.218.133
209.141.45.223
58.63.2.60
121.32.54.139
124.133.230.74
124.133.230.74
194.87.138.147
116.55.39.30
1.204.112.183
58.16.228.95
114.247.103.116
220.197.183.201
3.35.23.225
45.132.12.125
123.206.70.180
103.87.10.8
1.201.151.8
47.52.98.110
43.239.167.146
117.93.134.152
103.87.10.6
183.6.115.9
114.235.180.31
115.85.32.210
121.42.12.130
139.205.207.122
143.255.198.242
175.24.67.69
175.43.3.82
175.44.152.123
193.106.30.234
195.154.28.233
195.54.160.104
195.54.167.183
195.54.167.62
195.54.167.63
195.54.167.64
80.82.70.106
89.248.174.53
94.102.49.28
94.102.49.29
94.20.64.42
196.61.192.252
172.87.25.74
114.218.129.252
45.201.54.66
172.247.127.14
103.217.253.181
103.79.52.75
106.74.152.42
124.152.76.193
45.250.198.234
180.215.203.10
49.68.86.195
157.255.17.17
175.167.23.194
149.248.16.76
123.186.212.151
163.197.0.31
60.214.107.172
163.197.0.74
195.154.94.15
106.7.70.140
114.239.143.28
114.239.176.240
114.239.178.107
49.83.205.49
49.85.54.100
49.89.175.30
49.89.250.103[溯源分析tips]收到攻击ip之后,先在进行相关日志分析,有没有同组或者同段ip对我们防护目标进行过类似攻击,如果有可以更精确的溯源他们的攻击方法,比如在NTA上查找这些攻击者ip,也许能回溯到一些0day
123.246.198段有个团队
112.162.109.34 命令注入
103.145.107.26 这个IP 攻击队
223.104.3.24 39.99.160.90,应该是攻击队现场的4G地址
情报共享:1、第一支队伍出口IP
39.103.138.156
39.103.138.156
39.103.138.154
39.103.138.20
39.103.138.92
跳板机IP:
39.156.57.19
39.156.57.17
2、第二支队伍出口IP
39.107.111.182
39.107.108.116
39.107.111.182
39.107.112.96
39.107.112.213
跳板机IP:
39.156.57.120
39.156.57.93
3、攻击队入住酒店IP:
124.202.183.131
4、攻击队物理主机nds服务器:
202.106.46.151
5、目前怀疑39.156.56.0/24 为所有攻击队第一跳出口网段。
6、因为今天是测试,所有IP基本都在一个段里,后期会换。
43.247.90.100 恶意ip直接封
(友商提供,供参考)
各单位封禁:
213.217.0.216
216.126.231.24
216.24.188.130
216.240.134.70
216.250.111.90
217.12.202.89
217.12.208.162
217.12.208.227
217.12.208.251
217.12.218.99
218.253.251.100
218.253.251.74
219.146.156.17
220.197.183.201
221.181.173.48
221.237.189.200
222.186.39.123
223.68.10.24
红队第一批攻击IP清单:
114.247.103.116
121.234.236.193
49.89.250.166
114.239.16.18
49.89.242.53
114.239.104.49
114.239.17.136
114.239.176.240
81.68.168.223
81.68.169.72
81.68.167.29
81.68.170.78
81.68.168.250
81.68.173.7
请各单位根据实际情况进行封禁
可信度高XX集团获得的红队IP:
114.247.103.116
121.234.236.193
49.89.250.166
114.239.16.18
49.89.242.53
114.239.104.49
114.239.17.136
114.239.176.240
近日,网上有关于冰蝎webshell 3.0的工具发布。
处置建议:
【WAF】
自定义规则进行防护:(uri_path * rco .(jsp|jspx|php)$)&&(method * belong POST)&&(request_body * req ^[w+/]{1000,}=?=?$)
【IPS/IDS】
若webshell使用为aspx脚本可采用原有的检测规则进行检测:
规则ID:[41698] 冰蝎加密 ASPX Webshell文件上传
若webshell为asp、jsp、php脚本,检测规则包预计下午发布。
42.81.56.6 – 北京奇虎科技有限公司
某蓝队同步的攻击IP:
39.107.221.136
103.73.161.42
139.180.158.21
45.153.241.16
36.133.35.7
47.105.94.173
129.204.161.41
185.193.127.203
47.94.173.110
45.32.207.129
185.243.242.116
176.123.3.162
39.106.144.55
123.56.45.146
42.51.203.12
47.113.94.95
193.32.163.21
47.92.157.248
81.70.19.111
23.235.157.250
122.114.195.209
43.226.153.250
47.113.84.149
204.16.247.89
47.93.229.0
217.8.117.36
118.25.146.4
47.114.147.112
47.107.119.102
18.166.31.113
106.52.3.36
47.97.157.24
175.24.46.93
42.194.198.77
47.99.211.221
106.13.8.47
117.174.113.71
180.215.228.28
155.159.252.141
156.96.119.124
154.209.69.6
103.115.44.149
63.33.26.142
150.107.3.134
155.235.36.4
123.56.24.182
121.46.26.213
185.176.27.2
39.106.21.92
103.97.34.151
43.239.158.224
39.108.219.31
198.44.243.217
31.220.42.94
47.93.56.253
59.110.242.202
192.119.111.42
185.236.232.102
185.35.137.219
23.235.147.98
185.35.137.212
114.215.86.71
45.66.250.104
185.35.137.211
210.16.180.151
47.74.39.152
156.96.59.27
45.199.113.43
5.149.253.199
86.105.18.113
154.85.13.47
104.168.242.150
59.110.226.193
140.143.17.16
46.166.129.194
138.91.151.13
23.235.147.131
78.157.28.65
223.223.179.130
攻击源IP:39.106.35.229
漏洞类型:多种漏洞
利用攻击IP:
125.109.194.75
218.3.182.119
122.4.43.254
117.87.232.117
110.82.64.78
113.120.35.153
117.136.67.2
39.107.221.136
39.106.144.55
39.106.21.92
154.86.3.74、154.8.3.32、154.86.3.59,香港云服务器
Tea0:
218.253.251.30 漏扫
:
【共享情报】
友情提示:其他央企提供信息
新增攻击队4G现场地址
223.104.3.24
39.99.160.90,建议封掉
【共享情报】
223.223.179.130
各单位,这个地址是攻击地址,宁夏公司已经抓到攻击,河南也发现了。
请各单位赶紧排查是否被该地址攻击。
将这域名tj.2345ae.com封禁
转载:https://blog.csdn.net/anquanzushiye/article/details/108067963