[94958] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: RBL for bots?

daemon@ATHENA.MIT.EDU (Sean Donelan)
Thu Feb 15 12:02:11 2007

Date: Thu, 15 Feb 2007 11:45:48 -0500 (EST)
From: Sean Donelan <sean@donelan.com>
To: Drew Weaver <drew.weaver@thenap.com>
Cc: nanog@merit.edu
In-Reply-To: <B9ECBF8D89E7684EB63FF250E8788B1942CA44@BIGLOG.thenap.com>
Errors-To: owner-nanog@merit.edu


On Thu, 15 Feb 2007, Drew Weaver wrote:
>    Has anyone created an RBL, much like (possibly) the BOGON list which
> includes the IP addresses of hosts which seem to be "infected" and are
> attempting to brute-force SSH/HTTP, etc?

Bots are rarely single purpose engines.  If they have been detected doing 
bad things, they will probably appear in multiple RBLs for multiple
reasons.  If something is in multiple RBLs, even if it hasn't done the 
particular badness you are looking for, its probably just a matter of 
time.

Perhaps not surprising, some of the porn site vendors appear to have 
the most sophisticated systems for detecting brute force/password sharing
attacks.

home help back first fref pref prev next nref lref last post