Closed RickTorresJr closed 1 month ago
One IP that hit me today azpdssb25.stretchoid.com[52.183.224.78]
More discussion on https://github.com/datacenters-network/security/discussions/228
another stretchoid attack: https://www.abuseipdb.com/check/172.168.41.126
I added a scan task for 172.160.0.0/11 on https://security.wdes.eu/scan/tasks
And 4.144.0.0/12
for @RickTorresJr from the initial report
They moved their scanning infrastructure so an all new approach was needed to compile the IP list for Stretchoid.
@Xorlent no offense, but instead of releasing an IP list stored in a repo (which is already discussed here as to why it is a bad idea), you could disclose the script you use to fetch the IPs, so @williamdes could add the script for updating his artifacts.
@Xorlent no offense, but instead of releasing an IP list stored in a repo (which is already discussed here as to why it is a bad idea), you could disclose the script you use to fetch the IPs, so @williamdes could add the script for updating his artifacts.
@karolyi - Absolutely I understand and agree, although I suspect publicly posting methods for generating these lists will make our jobs as defenders more difficult as they discover our methods and more easily develop circumventions. I would happily privately provide the information to someone I know will care for all the work I've put in to get the list to its current state.
Hi everybody,
I have put countless days into refactoring my project, and I now announce that it works in a very basic mode for now. The worker is detached from the server and communicates via websocket.
The worker authenticates giving a username it decided about. And then will receive scan tasks. But if one knows better than the scan task, it can decide to do it's own scripts and only report back the results.
If there is some interest about this new worker mode, I will add documentation. Let me know
Feel free to contribute to this repo and scanning methods. @Xorlent can I use your list to scan it's contents and update my results ?
My IPS got tripped today by 2 IPs. Upon further inspection these IPs resolved to stretchoid.com domains but are not on the stretchoid.com lists. Both IPs look to belong to Microsoft, 1 of them being recently transferred. Thanks.