• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Can I use Malware Filter Lists in pfBlockerNG that contain only IP address

Scheduled Pinned Locked Moved pfBlockerNG
11 Posts 5 Posters 3.1k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • X
    Xentrk
    last edited by Apr 23, 2017, 12:14 PM Apr 23, 2017, 11:22 AM

    These files contain IP address of sites that spread malware. The format of the files contains IP address and does not have the 127.0.0.1 ip in front of them.  Is there a way for pfBlockerNG to use lists with this type of format?

    https://gitlab.com/swe_toast/malware-filter/raw/master/malware-filter.list

    http://cinsscore.com/list/ci-badguys.txt
    http://malc0de.com/bl/IP_Blacklist.txt
    http://sanyalnet-cloud-vps.freeddns.org/mirai-ips.txt
    http://www.abuseat.org/iotcc.txt
    http://www.malwaredomainlist.com/hostslist/ip.txt
    https://feodotracker.abuse.ch/blocklist/?download=ipblocklist
    https://lists.blocklist.de/lists/bots.txt
    https://lists.blocklist.de/lists/ssh.txt
    https://ransomwaretracker.abuse.ch/downloads/CW_PS_IPBL.txt
    https://ransomwaretracker.abuse.ch/downloads/LY_PS_IPBL.txt
    https://ransomwaretracker.abuse.ch/downloads/RW_IPBL.txt
    https://ransomwaretracker.abuse.ch/downloads/TC_PS_IPBL.txt
    https://ransomwaretracker.abuse.ch/downloads/TL_C2_IPBL.txt
    https://ransomwaretracker.abuse.ch/downloads/TL_PS_IPBL.txt
    https://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt
    https://zeustracker.abuse.ch/blocklist.php?download=badips

    pfSense 2.4.4_2 | Intel i5-3450 @ 3.10GHz  | AES-NI enabled |  pfBlockerNG | Snort
    Blog Site: https://x3mtek.com || GitHub: https://github.com/Xentrk

    1 Reply Last reply Reply Quote 0
    • B
      BBcan177 Moderator
      last edited by Apr 23, 2017, 1:52 PM Apr 23, 2017, 1:46 PM

      IPv4/6 lists can be added to the IPv4/6 tabs respectively.  Domain based lists can be added to the DNSBL feeds tab. All the lists above are usable in the pkg.

      "Experience is something you don't get until just after you need it."

      Website: http://pfBlockerNG.com
      Twitter: @BBcan177  #pfBlockerNG
      Reddit: https://www.reddit.com/r/pfBlockerNG/new/

      1 Reply Last reply Reply Quote 0
      • X
        Xentrk
        last edited by Apr 24, 2017, 12:40 AM

        @BBcan177:

        IPv4/6 lists can be added to the IPv4/6 tabs respectively.  Domain based lists can be added to the DNSBL feeds tab. All the lists above are usable in the pkg.

        Thank you @BBcan177.  Doing as you suggest is the solution. I ran the update to confirm. Thanks for the help and for developing the great package pfBlockerNG!

        pfSense 2.4.4_2 | Intel i5-3450 @ 3.10GHz  | AES-NI enabled |  pfBlockerNG | Snort
        Blog Site: https://x3mtek.com || GitHub: https://github.com/Xentrk

        1 Reply Last reply Reply Quote 0
        • M
          moscato359
          last edited by May 3, 2017, 6:25 PM

          Instead of that pile of ransomeware lists, have you considered the combined one?

          https://ransomwaretracker.abuse.ch/downloads/RW_IPBL.txt

          https://ransomwaretracker.abuse.ch/blocklist/ has the details

          It contains TC_PS_IPBL, LY_C2_IPBL, TL_C2_IPBL, TL_PS_IPBL, CB_PS_IPBL

          1 Reply Last reply Reply Quote 0
          • X
            Xentrk
            last edited by Jun 14, 2017, 8:09 AM

            Thanks for the suggestion. I am always looking for better ways!  :)

            pfSense 2.4.4_2 | Intel i5-3450 @ 3.10GHz  | AES-NI enabled |  pfBlockerNG | Snort
            Blog Site: https://x3mtek.com || GitHub: https://github.com/Xentrk

            1 Reply Last reply Reply Quote 0
            • Q
              Qinn
              last edited by Jun 14, 2017, 9:49 AM

              I get a  error on https://ransomwaretracker.abuse.ch/downloads/RW_IPBL.txt in IPv4  anyone any suggestions?

              [ RW_IPBL ] Downloading update . cURL Error: 35
              OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to ransomwaretracker.abuse.ch:443  Retry in 5 seconds…
              . cURL Error: 35

              Cheers Qinn

              Hardeware: Intel(R) Celeron(R) J4125 CPU @ 2.00GHz 102 GB mSATA SSD (ZFS)
              Firmware: Latest-stable-pfSense CE (amd64)
              Packages: pfBlockerNG devel-beta (beta tester) - Avahi - Notes - Ntopng - PIMD/udpbroadcastrelay - Service Watchdog - System Patches

              1 Reply Last reply Reply Quote 0
              • F
                f34rinc
                last edited by Jun 14, 2017, 3:47 PM

                @Qinn:

                I get a  error on  cURL Error: 35 OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to ransomwaretracker.abuse.ch:443  Retry in 5 seconds…

                Can you change the format type to AUTO and try again

                ![2017-06-14 11_46_22.png](/public/imported_attachments/1/2017-06-14 11_46_22.png)
                ![2017-06-14 11_46_22.png_thumb](/public/imported_attachments/1/2017-06-14 11_46_22.png_thumb)

                1 Reply Last reply Reply Quote 0
                • Q
                  Qinn
                  last edited by Jun 14, 2017, 6:06 PM

                  Thanks for your reply, but it  was on "Auto" when the error was created, so no hopes there I am afraid.

                  Cheers Qinn

                  Hardeware: Intel(R) Celeron(R) J4125 CPU @ 2.00GHz 102 GB mSATA SSD (ZFS)
                  Firmware: Latest-stable-pfSense CE (amd64)
                  Packages: pfBlockerNG devel-beta (beta tester) - Avahi - Notes - Ntopng - PIMD/udpbroadcastrelay - Service Watchdog - System Patches

                  1 Reply Last reply Reply Quote 0
                  • B
                    BBcan177 Moderator
                    last edited by Jun 15, 2017, 3:19 AM

                    That URL seems to be ok?

                    curl -sI https://ransomwaretracker.abuse.ch/downloads/RW_IPBL.txt

                    HTTP/1.1 200 OK
                    Date: Thu, 15 Jun 2017 03:17:16 GMT
                    Server: Apache/2
                    Strict-Transport-Security: max-age=15768000 ; includeSubDomains
                    Last-Modified: Thu, 15 Jun 2017 03:15:02 GMT
                    ETag: "2907a-551f7131791fa"
                    Accept-Ranges: bytes
                    Content-Length: 168058
                    Cache-Control: max-age=300
                    Expires: Thu, 15 Jun 2017 03:22:16 GMT
                    X-Content-Type-Options: nosniff
                    X-XSS-Protection: 1; mode=block
                    X-Frame-Options: sameorigin
                    Content-Type: text/plain

                    When you use "Auto" it will use TLS to connect to the Feed…  Do you have a proxy that might be causing issues?

                    "Experience is something you don't get until just after you need it."

                    Website: http://pfBlockerNG.com
                    Twitter: @BBcan177  #pfBlockerNG
                    Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                    1 Reply Last reply Reply Quote 0
                    • X
                      Xentrk
                      last edited by Jun 15, 2017, 2:45 PM

                      @Qinn:

                      I get a  error on https://ransomwaretracker.abuse.ch/downloads/RW_IPBL.txt in IPv4  anyone any suggestions?

                      [ RW_IPBL ] Downloading update . cURL Error: 35
                      OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to ransomwaretracker.abuse.ch:443  Retry in 5 seconds…
                      . cURL Error: 35

                      Cheers Qinn

                      I got around to updating my list and the URL worked for me. I used Auto, On, https://ransomwaretracker.abuse.ch/downloads/RW_IPBL.txt and rwipbl for the field values.  Did you try going to the url in the browser?

                      pfSense 2.4.4_2 | Intel i5-3450 @ 3.10GHz  | AES-NI enabled |  pfBlockerNG | Snort
                      Blog Site: https://x3mtek.com || GitHub: https://github.com/Xentrk

                      1 Reply Last reply Reply Quote 0
                      • Q
                        Qinn
                        last edited by Jun 16, 2017, 3:42 PM

                        Suddenly it works  :o even with RW_IPBL?

                        Thanks for all reply's

                        Hardeware: Intel(R) Celeron(R) J4125 CPU @ 2.00GHz 102 GB mSATA SSD (ZFS)
                        Firmware: Latest-stable-pfSense CE (amd64)
                        Packages: pfBlockerNG devel-beta (beta tester) - Avahi - Notes - Ntopng - PIMD/udpbroadcastrelay - Service Watchdog - System Patches

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                          This community forum collects and processes your personal information.
                          consent.not_received