Path: csiph.com!aioe.org!FT569Z939xfz0OfyBBppTQ.user.46.165.242.91.POSTED!not-for-mail From: Supratim Sanyal Newsgroups: comp.os.linux.security Subject: current public ip blocklists Date: Sun, 6 Mar 2022 00:00:57 -0500 Organization: Aioe.org NNTP Server Message-ID: Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Info: gioia.aioe.org; logging-data="6789"; posting-host="FT569Z939xfz0OfyBBppTQ.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org"; User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:91.0) Gecko/20100101 Thunderbird/91.6.1 Content-Language: en-US X-Notice: Filtered by postfilter v. 0.9.2 Xref: csiph.com comp.os.linux.security:753 I am currently maintaining the following IP blocklists based on brute-force attacks. Maybe useful to folks usimg pfBlockerNG on pfSense, pihole, etc. http://sanyalnet-cloud-vps.freeddns.org/blocklist.txt http://sanyalnet-cloud-vps2.freeddns.org/blocklist.txt http://sanyalnet-cloud-vps3.freeddns.org/blocklist.txt http://sanyalnet-cloud-vps4.duckdns.org/blocklist.txt http://impvax.duckdns.org/blocklist.txt http://hecnet-us-east-gw.duckdns.org/blocklist.txt (the last two are currently the same server for now). thanks.