Wiki/rss/osint.xml

68 lines
3.6 KiB
XML

<feed xmlns="http://www.w3.org/2005/Atom">
<title>AniNIX/RSS | OSINT Feed</title>
<icon>https://foundation.aninix.net/assets/img/AniNIX.png</icon>
<logo>https://foundation.aninix.net/assets/img/AniNIX.png</logo>
<link rel="self" href="https://aninix.net/AniNIX/Wiki/raw/branch/main/rss/osint.xml" />
<link href="https://aninix.net/" />
<updated>2022-09-26T02:16:20Z</updated>
<author>
<name>AniNIX</name>
</author>
<id>https://aninix.net/</id>
<entry>
<title>84.239.54.49</title>
<link href="https://aninix.net/AniNIX/Wiki/raw/branch/main/rss/osint.xml#84.239.54.49"></link>
<updated>2024-06-27T17:25:00Z</updated>
<id>https://aninix.net/AniNIX/Wiki/raw/branch/main/rss/osint.xml#84.239.54.49</id>
<author><name>DarkFeather</name></author>
<summary>
A Romanian IP, 84.239.54.49, was detected pushing a variety of web application attacks and network trojan attempts against our web front. These were primarily Suricata/Snort signature 1:2016982:5 auto_prepend_file PHP config option in uri. We have no evidence that these attacks were successful. Total malicious attempts captured was 54.
</summary>
</entry>
<entry>
<title>2024MAR11 ACEVILLE PTELTD, Singapore</title>
<link href="https://aninix.net/AniNIX/Wiki/raw/branch/main/rss/osint.xml#ACEVILLEPTELTD"></link>
<updated>2024-03-11T07:52:00Z</updated>
<id>https://aninix.net/AniNIX/Wiki/raw/branch/main/rss/osint.xml#ACEVILLEPTELTD</id>
<author><name>DarkFeather</name></author>
<summary>
Provider "ACEVILLE PTELTD" from blocks 43.156.0.0/16, 43.134.0.0/15, 43.134.0.0/17 was detected trying to bruteforce our network with a distributed attack network. We are blocking these networks for malicious attempts in the hundreds.
</summary>
</entry>
<entry>
<title>24.144.93.118/32</title>
<link href="https://aninix.net/AniNIX/Wiki/raw/branch/main/rss/osint.xml#24.144.93.118"></link>
<updated>2023-11-17T03:30:00Z</updated>
<id>https://aninix.net/AniNIX/Wiki/raw/branch/main/rss/osint.xml#24.144.93.118</id>
<author><name>DarkFeather</name></author>
<summary>
24.144.93.118/32 was detected using a network scanner against our external address. Total volume was 55 -- this action repeated on 2023-11-18 at 08:40Z.
</summary>
</entry>
<entry>
<title>46.101.38.229/32</title>
<link href="https://aninix.net/AniNIX/Wiki/raw/branch/main/rss/osint.xml#46.101.38.229"></link>
<updated>2023-01-16T21:44:08Z</updated>
<id>https://aninix.net/AniNIX/Wiki/raw/branch/main/rss/osint.xml#46.101.38.229</id>
<summary>
46.101.38.229/32 was detected using a variety of attacks against our 80/tcp/http listener for AniNIX/WebServer. Suricata detection rules classified the incoming threats as a variety of SSH attacks -- total volume was 48.
</summary>
</entry>
<entry>
<title>5.181.86.78/32</title>
<link href="https://aninix.net/AniNIX/Wiki/raw/branch/main/rss/osint.xml#5.181.86.78"></link>
<updated>2023-01-16T21:44:07Z</updated>
<id>https://aninix.net/AniNIX/Wiki/raw/branch/main/rss/osint.xml#5.181.86.78</id>
<summary>
5.181.86.78/32 was detected using a variety of attacks against our 80/tcp/http listener for AniNIX/WebServer. Suricata detection rules classified the incoming threats as a variety of SQL injection methods and cross-site scripting. Total attack volume was 184.
</summary>
</entry>
</feed>