[tor-relays] Attacker IP database

Bryan Carey z0civic483 at gmail.com
Fri Aug 2 19:18:46 UTC 2013


Is there any kind of compiled list of IPs that relay operators can refer to
that are known bad IPs (sources of brute force SSH attempts, etc.)? Is
there a reason to NOT block (drop) traffic from these IPs?

Here are some that I have seen recently trying to brute force common user
accounts and root password attempts:
198.50.197.98
220.161.148.178
223.4.217.47
199.187.125.250
175.99.95.252
62.64.83.38
125.209.110.234
37.235.53.172

Also, in general what are some good security practices to keep in mind
while running a Tor relay?

Thanks,
Bryan
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20130802/b36769d4/attachment.html>


More information about the tor-relays mailing list