TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Visualizing malicious IP addresses

169 pointsby Bromeoabout 1 year ago

25 comments

reincoderabout 1 year ago
You can use IPinfo&#x27;s IP map (<a href="https:&#x2F;&#x2F;ipinfo.io&#x2F;tools&#x2F;map" rel="nofollow">https:&#x2F;&#x2F;ipinfo.io&#x2F;tools&#x2F;map</a>) or IP summary tool (<a href="https:&#x2F;&#x2F;ipinfo.io&#x2F;tools&#x2F;summarize-ips" rel="nofollow">https:&#x2F;&#x2F;ipinfo.io&#x2F;tools&#x2F;summarize-ips</a>).<p>Both of these services support sending IP addresses via an API endpoint and can handle up to 500k IP addresses. You can also share the report via URL.
评论 #40167199 未加载
mianosabout 1 year ago
I always wondered how the IPs like this 180.101.88.232 from this block:<p>ISP ChinaNet Jiangsu Province Network Domain Name chinatelecom.com.cn<p>Continue to be the source of thousands of ssh password login attempts for years and years on end.<p>It&#x27;s not a big deal, I use a tarpit on all ssh with 2FA on the one I use, but it seems ridiculous that some participants of the internet don&#x27;t give a shit about the rest of the world.
评论 #40166957 未加载
评论 #40166247 未加载
评论 #40166532 未加载
评论 #40165885 未加载
评论 #40165780 未加载
评论 #40166364 未加载
评论 #40192272 未加载
评论 #40165741 未加载
评论 #40165624 未加载
chriscjcjabout 1 year ago
It&#x27;s been a couple decades since I adminned servers and firewalls. In my experience, in the early 2000&#x27;s, Russian IPs were extremely common. I was surprised that OP didn&#x27;t see even one. Can anyone conjecture on what might account for the apparent change?
评论 #40166139 未加载
评论 #40166095 未加载
channel_tabout 1 year ago
These kinds of experiments get even more interesting when you also pipe the IPs into Shodan and find out that a lot of the malicious login attempts are coming from pwned DVRs and other devices.
dfexabout 1 year ago
&gt; Upon closer inspection of Asia, we can notice a significant number of addresses located in South Kora, (and possibly North Korea?), as well as in Taiwan.<p>&gt; I was surpised to see that the distribution of attacks is extremely uneven with most of it concentrated in parts of Asia, Europe, and the US, and (almost) none from South America, Middle East, and Russia.<p>Aside from the casual stereotyping of bad actors here, the article completely neglects the fact that just because the attack is sourced from a certain IP&#x2F;geolocation doesn&#x27;t mean that the attacker resides in that location.<p>What you most likely have is a listed of pwned PCs with fast internet connections being used in botnets.
评论 #40166214 未加载
评论 #40166232 未加载
评论 #40166694 未加载
midnight_shamanabout 1 year ago
I always install fail2ban on publicly exposed machines, especially if ssh is enabled. It won&#x27;t block new malicious IPs but at least it will stop bruteforce attacks coming from each IP
评论 #40166727 未加载
mcoliverabout 1 year ago
Fun. You could also try putting the data into Google&#x27;s data studio (now looker) to visualize them in an interactive map you can publish. Add things like size of dot corresponding to number of attempts, add reverse DNS&#x2F;whois info to the info bubble, etc. Wonder how much came from residential vs business ip space.<p><a href="https:&#x2F;&#x2F;lookerstudio.google.com" rel="nofollow">https:&#x2F;&#x2F;lookerstudio.google.com</a>
评论 #40165866 未加载
ies7about 1 year ago
&gt; Interesting! We can see the most locations in India, Indonesia, and China as well as a significant number in the US and Europe.<p>Are these because the bad guys are in there or just because of the population size?<p>China, India, US, and Indonesia are the top four of the most populous country and also 4 countries with most internet users.<p>Even the size of 10% of Indonesian internet users are almost the entire Taiwan population.
评论 #40166155 未加载
评论 #40167525 未加载
评论 #40165937 未加载
ludovicianulabout 1 year ago
A few years ago I&#x27;ve built a more simple visualization similar to this one with the attacks on the host the application was already deployed: <a href="https:&#x2F;&#x2F;github.com&#x2F;ludovicianul&#x2F;geolog">https:&#x2F;&#x2F;github.com&#x2F;ludovicianul&#x2F;geolog</a>. China was mostly leading, but there were many from US and Europe.
micwabout 1 year ago
&quot;Failed publickey&quot; - does this make sense? What is the chance to brute-force a private key that way?
评论 #40166089 未加载
评论 #40166109 未加载
评论 #40166568 未加载
评论 #40166647 未加载
wiradikusumaabout 1 year ago
Holy moly! That explains why I frequently get captcha when using residential internet in Jakarta. I don&#x27;t see those captcha when accessing from e.g. Kuala Lumpur or Singapore.<p>Is the information in the article actionable? E.g. can I complain to someone with authority?
评论 #40166229 未加载
brazzyabout 1 year ago
As others have pointed out, the location of the IP address does not necessarily correspond with the location of the attackers.<p>Specifically, in Germany, the central-ish culster of dots is in the Frankfurt area, which is also the location of DE-CIX, one of the world&#x27;s largest internet exchange points, and of roughtly 1&#x2F;3 of all datacenters in Germany.<p>So I think rather than comparing the IP locations with population density, it would be even more interesting to compare them with the location of internet infrastructure. This is of course correlated, and probably harder to find as an open dataset.
keepamovinabout 1 year ago
This was cool. The makings of an adhoc DIY cyber intelligence dashboard.<p>I guess the distribution could reflect places with lower income levels looking to get free compute? (for whatever purposes). A lot are coming out of places where relative cost of compute compared to income, may be too high, alternately there may not have access to accepted payment methods?<p>For the servers coming from the US and developed East Asia it could be already cyber companies doing scanning to find clients, or already compromised servers?
unravellerabout 1 year ago
If you&#x27;re lucky enough to have a big ISP with a single big block of IP addresses that never changes you can disallow all other ranges on your VPS admin ports and only have to worry about VPNing through that ISP.<p>I guess you could block the main country offenders but you&#x27;d have to pay an API to keep up with the IP allocations to be sure.
评论 #40166321 未加载
评论 #40165809 未加载
tonymetabout 1 year ago
why is ssh open to the internet to begin with?<p>ufw is the first thing I install, even on a &quot;private&quot; network and here&#x27;s why.<p>I recently installed a router with IPv4 and IPV6. I later found out that IPv6 was globally addressed with no firewall.<p>Always run ufw and begin by shutting off everything to the internet, then only open up what you need.
评论 #40166434 未加载
评论 #40166444 未加载
评论 #40166557 未加载
评论 #40167261 未加载
评论 #40166791 未加载
spacecadetabout 1 year ago
I automate the hell out of packet capture, using the max ipinfo free tier each month... graph db... I cluster packets, organization dossier, and other collections of data as embeddings. Helps cut noise and identify anomalies faster.
评论 #40177908 未加载
voidUpdateabout 1 year ago
So this made me realise where I could find the SSH log file, and I spent a little while panicking at just how many attempts I&#x27;ve been getting on my webserver, and locking things down just a little harder out of paranoia
评论 #40167349 未加载
评论 #40167494 未加载
opentokixabout 1 year ago
This is literally built in, in most modern logging systems with visualization.
tetris11about 1 year ago
I&#x27;d recommend grepping &quot;(Failed|Invalid)&quot; to capture more IPs
评论 #40166842 未加载
3abitonabout 1 year ago
I have been doing similar, albeit less complex analysis, of incoming malicious, and it&#x27;s always surprising the amount of relentless attacks. Any good practices to maintain a secure online server?
评论 #40167452 未加载
mo_42about 1 year ago
It&#x27;s not so hard to use Tor for that. I wonder how the Tor exit nodes are distributed across the globe and see how that correlates or not.
评论 #40166103 未加载
JSDevOpsabout 1 year ago
Awesome content! Brilliant post. You could use maxmind and use the free files to get your data.
imp0catabout 1 year ago
Wouldn&#x27;t it be better and faster to use a local geoip database for the IP lookup instead of doing a network call for each?
评论 #40167572 未加载
wsintra2022about 1 year ago
Interesting, if it’s an issue you could try port knocking to prevent the constant attempts
评论 #40165527 未加载
ajsnigrutinabout 1 year ago
&gt; Finding the location of each attacker.<p>...of the attacking IP address, not attacker...<p>If I, living in a small EU country, wanted to &quot;hack&quot; my neighbour across the street, I sure as hell wouldn&#x27;t use my home IP address, tied to my account at my ISP, which has my name and address.<p>I&#x27;d probably try to find an &quot;IP&quot; (VM, vpn, or whatever) in a country that&#x27;s not really friendly about giving &quot;ip address data&quot; to our authorities.<p>On the other hand, I wouldn&#x27;t use a chinese IP in china, if I lived there and wanted to hack my neighbour over there.