Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc.
79
stars
27
forks
source link
Proper handling of empty (or not-present) caches #9
Closed
jpsenior closed 8 years ago
From andreas on protect724:
i "touched" cache/alienvault.txt as it was not present.
after rerunning the script, i see
/threataggregator.py Processing alienvault from https://reputation.alienvault.com/reputation.data Comparing 12424 downloaded to 12424 cached lines 0 new, 0 deleted, 12424 unchanged lines Processing malc0de.com IP Blacklist from http://malc0de.com/bl/IP_Blacklist.txt Comparing 69 downloaded to 69 cached lines 3 new, 3 deleted, 66 unchanged lines Processing emergingthreats.net Compromised IPs from http://rules.emergingthreats.net/blockrules/compromised-ips.txt Comparing 1043 downloaded to 1043 cached lines 0 new, 0 deleted, 1043 unchanged lines Processing emerginghtreats.net Blocked IPs from http://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt Comparing 1478 downloaded to 1478 cached lines 0 new, 0 deleted, 1478 unchanged lines Processing abuse.ch Palveo Tracker from https://palevotracker.abuse.ch/blocklists.php?download=ipblocklist Comparing 17 downloaded to 18 cached lines 1 new, 2 deleted, 16 unchanged lines Processing Binary Defense Systems Banlist from http://www.binarydefense.com/banlist.txt Comparing 21973 downloaded to 21973 cached lines 0 new, 0 deleted, 21973 unchanged lines