• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

stretchoid.com IP list for use in blocking their port scans

Scheduled Pinned Locked Moved Firewalling
13 Posts 7 Posters 14.4k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S
    Sissy
    last edited by Sissy Jan 11, 2022, 5:10 PM Jan 11, 2022, 5:09 PM

    In the last 24 hours, more than 150 separate IP addresses controlled by stretchoid.com have scanned numerous ports on two static IPs assigned to me.

    The "opt-out" form at stretchoid.com is simply phishing. If you fill it out, the scans continue, but they have your name, email address, and CIDR block you asked them to stop scanning.

    Stretchoid's website claims that "Stretchoid is a platform that helps identify an organization's online services." I see no way to access their findings and they don't seem to offer them for sale.

    The vast majority of their scans seem to be aimed at finding vulnerable admin interfaces and services, not online services for public use. Given the ongoing cost of having more than 800 scanning IPs hosted on Digital Ocean, I wonder if "stretchoid.com" is being funded to identify targets for state-sponsored cybercrime, such as ransomware attacks.

    For years, Digital Ocean, has allowed this to go on. I suspect that it may be an example of "bulletproof hosting" in which the owners of stretchoid.com have paid for a "no kill" clause in their contract with Digital Ocean.

    Since all of the stretchoid.com IPs I've seen in recent times have been in the 192.241.128.0/17, I did a little one-liner on my iMac Pro to query for PTR records, dumping the results to a text file:

    for N in {128..255}; do echo "Testing 192.241.$N.0 - 192.241.$N.255" >> stretchoid_ips.txt; for L in {0..255}; do host -t PTR "192.241.$N.$L" | grep -qF 'stretchoid.com.' && echo "192.241.$N.$L `host -t PTR \"192.241.$N.$L\"`" >> stretchoid_ips.txt; done; done
    

    It's ugly and crude, but the output is simple to edit into the IP address and PTR record you see at the file link below, which is sorted by PTR record.

    Copy the list into your clipboard, go to Firewall --> Aliases in pfSense and then select "Import" (at the bottom right). Paste the clipboard contents into the Aliases To Import box and you can use the resulting IP alias to block stretchoid.com scans.

    Notes:

    1. The list is based on public PTR records (reverse DNS), the accuracy of which I cannot verify.
    2. If there are stretchoid.com IPs outside of the 192.241.128.0/17 block that I queried, they are not included.
    3. I make no guarantees. The list may be wrong. My methodology may be flawed.
    4. If you choose to use the list, you do so at your own risk.
    5. I am not offering to maintain the list, update the list, or remove the list should IP addresses be reassigned.
    6. This isn't my list. It's public information as of January 10, 2022. I would welcome someone turning it into a maintained feed that others (including me) could use.

    -- Sissy

    stretchoid_IPs.txt

    J 1 Reply Last reply Jan 11, 2022, 5:22 PM Reply Quote 1
    • J
      johnpoz LAYER 8 Global Moderator @Sissy
      last edited by johnpoz Jan 11, 2022, 5:25 PM Jan 11, 2022, 5:22 PM

      @sissy said in stretchoid.com IP list for use in blocking their port scans:

      IPs I've seen in recent times have been in the 192.241.128.0/17

      Why would you need to parse anything? If you have the netblock they are coming from, just block the whole /17?

      For that matter block all of digitalocean inbound.. What/who would be coming from some IP hosted at DO? Sure not going to be actual clients you would like to allow.. Block their whole freaking ASN, which you can easy setup with pfblocker.

      Inbound block doesn't stop you from going there, but it would stop any inbound unsolicited traffic to your IP, like scanning for what ports you have open,etc... I show the ASN for that netblock to be AS14061 – DigitalOcean, LLC

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

      S F 2 Replies Last reply Jan 11, 2022, 7:42 PM Reply Quote 1
      • S
        Sissy @johnpoz
        last edited by Jan 11, 2022, 7:42 PM

        @johnpoz said in stretchoid.com IP list for use in blocking their port scans:

        @sissy said in stretchoid.com IP list for use in blocking their port scans:

        IPs I've seen in recent times have been in the 192.241.128.0/17

        Why would you need to parse anything? If you have the netblock they are coming from, just block the whole /17?

        Because there are 32K IP addresses in that range and only 2.5% of them are assigned to stretchoid.com. Some of the others are assigned to legitimate small businesses and organizations, some of which could be clients of, or vendors to, someone for whom I provide services.

        For that matter block all of digitalocean inbound.. What/who would be coming from some IP hosted at DO?

        Email is one thing that comes to mind, and there are just shy of half a million mail servers hosted on Digital Ocean.

        Sure not going to be actual clients you would like to allow.. Block their whole freaking ASN, which you can easy setup with pfblocker.

        No one would want to do business with python.org, letsencrypt.org, or Alex Green Farms, which sells organic fruits and vegetables, right? I may not like that the National Eating Disorders Association (NEDA) chose Digital Ocean as their provider, but NEDA is the type of organization that might turn to my client for content creation.

        Inbound block doesn't stop you from going there, but it would stop any inbound unsolicited traffic to your IP, like scanning for what ports you have open,etc... I show the ASN for that netblock to be AS14061 – DigitalOcean, LLC

        My firewall is on a business Internet connection on which I host servers. It's not something through which I'm web surfing. I don't have the option of firewalling off 2.6 million U.S. IP addresses and then just hoping that everything works out.

        There is another very good reason for parsing: I have a rule that is logging port scans by stretchoid.com so that I have a record of the activity.

        1 Reply Last reply Reply Quote 1
        • S
          SprockTech
          last edited by SprockTech Aug 22, 2022, 12:34 PM Aug 22, 2022, 12:34 PM

          @Sissy Thanks for this. Also, looks like they have an opt-out form on their website, FWIW. https://stretchoid.com/

          F 1 Reply Last reply Aug 22, 2022, 12:51 PM Reply Quote 0
          • F
            fireodo @SprockTech
            last edited by fireodo Aug 22, 2022, 1:07 PM Aug 22, 2022, 12:51 PM

            @sprocktech said in stretchoid.com IP list for use in blocking their port scans:

            Also, looks like they have an opt-out form on their website

            In my opinion its strange to opt-out from something I never opt-in ... and btw - I dont like self proclaimed Internet Policemens ... 😀
            AS14061 is in my pfblocker and until now I never saw from there any legit connection ... 😉

            Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
            SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
            pfsense 2.7.2 CE
            Packages: Apcupsd Cron Iftop Iperf LCDproc Nmap pfBlockerNG RRD_Summary Shellcmd Snort Speedtest System_Patches.

            J 1 Reply Last reply Aug 22, 2022, 1:29 PM Reply Quote 1
            • F
              fireodo @johnpoz
              last edited by fireodo Aug 22, 2022, 1:22 PM Aug 22, 2022, 1:21 PM

              @johnpoz said in stretchoid.com IP list for use in blocking their port scans:

              For that matter block all of digitalocean inbound

              Also works with the IP-feed Cinsscore
              in pfblockerNG-devel for all the strechoids ... 🤓

              Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
              SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
              pfsense 2.7.2 CE
              Packages: Apcupsd Cron Iftop Iperf LCDproc Nmap pfBlockerNG RRD_Summary Shellcmd Snort Speedtest System_Patches.

              1 Reply Last reply Reply Quote 1
              • J
                johnpoz LAYER 8 Global Moderator @fireodo
                last edited by Aug 22, 2022, 1:29 PM

                @fireodo yeah a home user would have zero need for anything coming from DO at all.. But as mentioned you might if your hosting email services, etc.

                I found this parsed listed of the stretchoid IPs
                https://github.com/SilvrrGIT/IP-Lists/blob/master/stretchoid

                Looks like last updated 21 days..

                As the OP stated that opt-out thing could just be way to get more info - who knows.. I see their IPs hitting my wan... To me its just one of the many other bots, scripts, whatever - who cares.. If they find my open ports... Can't lock down the ports from every single IP - have them locked down to country already..

                What does it get you blocking them - still traffic hitting your wan.. So what if they find out your running smtp server.. You are running a smtp server open to the planet anyway ;)

                If anything I could see just blocking and not logging the traffic maybe if its filling up your logs with stuff you don't care to see.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                S 1 Reply Last reply Aug 22, 2022, 1:37 PM Reply Quote 1
                • S
                  SprockTech @johnpoz
                  last edited by Aug 22, 2022, 1:37 PM

                  @johnpoz Doh, I skipped over the part in the OP about the opt-out. Oh well, I at least wanted to say thanks for the contribution. Everyone has a different way of doing things.

                  NogBadTheBadN 1 Reply Last reply Aug 22, 2022, 2:49 PM Reply Quote 1
                  • NogBadTheBadN
                    NogBadTheBad @SprockTech
                    last edited by Aug 22, 2022, 2:49 PM

                    @sprocktech

                    https://isc.sans.edu/api/threatlist/shodan/?xml

                    https://isc.sans.edu/api/threatlist/shadowserver/?xml

                    Handy for pfBlocker:-

                    Screenshot 2022-08-22 at 15.47.25.png

                    Andy

                    1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                    W 1 Reply Last reply Jul 30, 2023, 9:10 PM Reply Quote 1
                    • W
                      williamdes @NogBadTheBad
                      last edited by Jul 30, 2023, 9:10 PM

                      Hi all,

                      This is an old subject but has good SEO.
                      There is lists of stretchoid IPs: https://github.com/SilvrrGIT/IP-Lists/issues/85

                      I built a much more complete one, you can find it here: https://github.com/SilvrrGIT/IP-Lists/issues/85#issuecomment-1657267386

                      I currently use this with my pfSense/OPNsense setup as a firewall alias.

                      Bob.DigB 1 Reply Last reply Aug 6, 2023, 5:58 PM Reply Quote 1
                      • Bob.DigB
                        Bob.Dig LAYER 8 @williamdes
                        last edited by Aug 6, 2023, 5:58 PM

                        @williamdes said in stretchoid.com IP list for use in blocking their port scans:

                        I built a much more complete one, you can find it here: https://github.com/SilvrrGIT/IP-Lists/issues/85#issuecomment-1657267386

                        I currently use this with my pfSense/OPNsense setup as a firewall alias.

                        Thanks, today I encountered some stretchoid hits from your list, which were not in the PRI group feeds.

                        J 1 Reply Last reply Aug 6, 2023, 8:56 PM Reply Quote 1
                        • J
                          johnpoz LAYER 8 Global Moderator @Bob.Dig
                          last edited by Aug 6, 2023, 8:56 PM

                          @Bob-Dig what were the ips?

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                          Bob.DigB 1 Reply Last reply Aug 7, 2023, 6:26 AM Reply Quote 0
                          • Bob.DigB
                            Bob.Dig LAYER 8 @johnpoz
                            last edited by Aug 7, 2023, 6:26 AM

                            @johnpoz said in stretchoid.com IP list for use in blocking their port scans:

                            @Bob-Dig what were the ips?

                            I already deleted the log file so I can't tell. But when I looked, they were almost identical to ones, which were already in PRI1.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                              This community forum collects and processes your personal information.
                              consent.not_received