←back to thread

597 points classichasclass | 1 comments | | HN request time: 0.302s | source
1. BLKNSLVR ◴[] No.45011532[source]
I've mentioned my project[0] before, and it's just as sledgehammer-subtle as this bot asks.

I have a firewall that logs every incoming connection to every port. If I get a connection to a port that has nothing behind it, then I consider the IP address that sent the connection to be malicious, and I block the IP address from connecting to any actual service ports.

This works for me, but I run very few things to serve very few people, so there's minimal collateral damage when 'overblocking' happens - the most common thing is that I lock myself out of my VPN (lolfacepalm).

I occasionally look at the database of IP addresses and do some pivot tabling to find the most common networks and have identified a number of cough security companies that do incessant scanning of the IPv4 internet among other networks that give me the wrong vibes.

[0]: Uninvited Activity: https://github.com/UninvitedActivity/UninvitedActivity

P.S. If there aren't any Chinese or Russian IP addresses / networks in my lists, then I probably block them outright prior to the logging.