IP Blacklists and suspicious inbound and outbound traffic

Posted by Pantelis Sopasakis on Server Fault See other posts from Server Fault or by Pantelis Sopasakis
Published on 2011-03-14T15:22:05Z Indexed on 2011/03/14 16:12 UTC
Read the original article Hit count: 317

Filed under:
|
|
|

I administer a web server and recently we had our IP banned (!) from our host after they received a notification e-mail for abuse. In particular our server is allegedly involved in spam attacks over HTTP. The content of the abuse report email we received was not much informative - for example the IP addresses our server is supposed to have attacked against are not included - so I started a wireshark session checking for suspicious traffic over TCP/HTTP while trying to locate possible security holes on the system. (Let me note that the machine runs a Debian OS).

Here is an example of such a request...

Source: 89.74.188.233
Destination: 12.34.56.78  // my ip
Protocol: HTTP
Info: GET 'http://www.media.apniworld.com/image.php?type=hv' HTTP/1.0

I manually blacklisted this host (as well as some other ones) blocking them with iptables, but I can't keep on doing manually all day long... I'm looking for an automated way to block such IPs based on:

  1. Statistical analysis, pattern recognition or other AI-based analysis (Though, I'm reluctant to trust such a solution, if exists)
  2. Public blacklists

Using DNSBL I actually found out that 89.74.188.233 is blacklisted. However other IPs which are strongly suspicious like 93.199.112.126 (i.e. http://www.pornstarnetwork.com/account/signin), unfortunately were not blacklisted! What I would like to do is to automatically connect my firewall with DNSBL (or some other blacklist database) and block all traffic towards blacklisted IPs or somehow have my local blacklist automatically updated.

© Server Fault or respective owner

Related posts about linux

Related posts about server