Fire-AV is a simple solution to your bad traffic/AV avoiding needs. Simply use the ips.txt file to begin blocking popular AV and cloud providers ips.
Aside from blocking av provider, Fire-AV can also be used as an ip encrichment tool to tag source ips
Fire-AV is now in its stable stage! Changes may still be added to asn-list.json
and formatting may change overtime(but less frequently)
maxmind-geoip-db is a mirror to the database maxmind provides for free.
It is an arms race to discover AV provider IPs and I need help. If you find any ips that is not in the list please open an github issue so that I can add it.
I do not recommend directly using the lists provided unless you are willing to do a lot of trial and errors. Instead, You are encouraged to build your own filter list to tailor it to your needs/infrastructure.
The blocklists should be integrated within the http server config(ie .htaccess) or updated dynamically by fetching the list and blocking at runtime.
ips/user-agents that fits the blacklist should be served an normal webpage or an 404 page
directory path | Description |
---|---|
sources/ips | Directory containing a list of ips |
sources/ips/by-tags | Directory containing a list of ips labeled with tags by bgp.tools |
sources/user-agents | Directory containing a list of User agents |
The regexps
directory in sources/user-agents
contains regexps rules to match common bots. All regexps are in javascript format so you need to parse them.
File path | Description |
---|---|
blacklists/blacklists-ips-ipv4.txt | Compiled ip ranges from the sources files |
blacklists/blacklists-ips-dangerous-ipv4.txt | Compiled ip ranges from the sources files that may break your program |
blacklists/blacklists-user-agent.txt | Compiled user agents from the sources files |
File path | Description |
---|---|
whitelists/whitelists-ips-ipv4.txt | Compiled ip ranges from the sources files |
whitelists/whitelists-ips-ipv4.txt | Compiled ip ranges from the sources files |
- Your domain keeps on getting flagged by AVs so you need a way to keep them from discovering the real payload.
- The stager payload is hosted on a webpage and it is CRUCIAL for it to not get detected by the AVs
- Your server keeps getting hacking attempts, and you want to block them at source (Through iptables or others)
This list should only be used for ethical purposes. I will not be responsible for any misuse of this list
- IP range "collapser", bunches up ip address using cidr notation.
- Blacklist compile