Open Troll338cz opened 2 months ago
Here is some recovered script files that contain more hosts and domains.
src.click - 173.212.202.205 mikrotik.digital - 117.55.202.199 src-ip.com - 178.128.214.44 zeroday.ltd - 212.237.231.84 0.zeroday.ltd - 117.55.202.199
final.rsc.txt lox.rsc.txt MikroTikSystem.rsc.txt src.click.rsc.txt
Good day @Troll338cz, I am travelling right now but I will have a look when back!
Hi, would it be possible to add ranges of possibly a botnet to this list? In recent months i found multiple sources of persistent attacks on MikroTik devices targeting open API/Winbox service, would it be possible to add them to this list?
attackers3.txt
List includes some known bulletproof hosting providers and many small networks that don't serve any legitimate traffic besides attacks, you can verify that thise ranges are abusive, here is few hosts that target API service specificly: https://www.abuseipdb.com/check/141.98.11.128 https://www.abuseipdb.com/check/193.41.206.142 https://www.abuseipdb.com/check/103.102.230.2