Browse your product documentation including release notes and installers
We are pleased to announce that the Abuse.ch feed has been updated to provide broader and deeper coverage!
New Abuse.ch Feed Coverage
Required Customer Action(s)
If you have any questions, please let us know!
Director, Product Management
How to check if the Feed is enabled
Yay! Thank you.
Which Carbon Black product is this for?
Application Administrator II
Cahaba Information Security
Phone: 205 220-1446
This is for the Cb Response product - I've updated the announcement.
Since the Abusech updates came out, we have been seeing alerts for traffic to the IP 220.127.116.11. We are treating these as legitimate hits, but I am wondering if anyone else is running into it or has seen it? It is the ZeuS IP Blocklist from Abusech that is flagging it, which is concerning. Just wondering if anyone else is seeing it. Thanks.
I'm seeing the same thing for the IP 18.104.22.168. In looking it up in domain tools it appears that 2,510,954 websites use the address.
We are currently seeing a decent number of hits, and investigating.
That IP is definitely bad...
Will share if I learn more.
This is not uncommon with IP based indicators, and is one of the reasons we spend more time investing in query based feeds that identify patterns of attack rather than static indicators. Sites that use shared hosting end up using the same IP addresses, and this IP is used by many, many sites (as mentioend by compl3tesle3t). I can confirm that there are sites hosted on that IP that are indeed owned/malicious (for example www[.]lafyeri[.]com), but obviously many/most of those sites hosted here are not compromised. Best bet is to look at the host in question, confirm that you are okay with the netconns you’re seeing within CbR, and then mark as a false positive.
As an update to my previous comments - our hits to this IP are actually the result of a DNS suffix misconfiguration.
Fixing this issue - we can rule out 99% of this.
Hope this helps others.
Yes we got a hit on that one. I could not see anything strange associated with it.
We have been seeing a lot of hits on this IP over the past week. We have found it associated to many different sites, but at this point have not seen any malicious activity on our network.
thank you for sharing the information .
This is a great addition, however we're observing a large number of false positives on the IP based indicators due to shared hosting.
Is there a way to keep IP data but only alert on Domains and Hash hits as they're higher fidelity? I don't want to lose the IP based data for enriching the logs...
It looks like there are only two options:
I have seen more reports on abuse.ch but when I look at the events no such IP is found. Anyone else seeing this?
This is generating an alert everyday for binaries that were alerted from other threat feeds back in Nov 2018 and Jan 2019. Please check to see if the feed is operating nominally.