This repository provides a daily updated list of IP addresses derived from Criminal IP (https://www.criminalip.io/) under the C2_TI license. Our goal is to offer a daily sample of 50 malicious IP addresses identified by the Criminal IP real-time threat hunting search engine, specializing in OSINT-based Cyber Threat Intelligence (CTI). This includes Command and Control (C2, C&C) IP addresses categorized under the C2_TI license.
Hosted on Criminal IP's official GitHub, this repository serves as a direct access point to our threat intelligence data. By showcasing a subset of our comprehensive data, we aim to raise awareness of potential threats and inspire users to delve deeper into our complete range of threat intelligence offerings.
For enhanced security response processes with broader threat intelligence insights, please contact us (https://www.criminalip.io/contact-us) to inquire about samples and API access for our complete dataset.
The selection criteria for the IP addresses listed in this repository are based on various conditions such as Criminal IP's threat tags (https://www.criminalip.io/developer/filters-and-tags/tags) and honeypot detections. This ensures a diverse representation of threats within the C2_TI dataset. The repository updates daily with a sample of 50 IP addresses, providing insights into a subset of the extensive C2_TI data.
These IP addresses are intentionally chosen to reflect a broad spectrum of conditions, showcasing different types of threats identified by Criminal IP's real-time threat hunting capabilities.
- Tags: IPs with C2_xx tags.
- Honeypot Detections: IPs caught in Criminal IP's honeypots.
- Additional conditions as specified by senior analysts.
The data provided includes the following fields, identical to those in the C2_TI license:
Field | Description |
---|---|
IP Address | The IP address. |
Target C2 | Type of Command and Control server. |
Open Ports | Ports open on the IP address (formatted as [80, 443]). |
Score (Inbound/Outbound) | Threat score for inbound and outbound traffic. |
Country | Country of origin. |
Scan Time | Time when the scan was conducted. |
Here is an example of the daily list format:
IP Address | Target C2 | Open Ports | Score (Inbound/Outbound) | Country | Scan Time |
---|---|---|---|---|---|
212.92.23.152 | c2_metasploit | 3790 | Critical/Critical | hu | 2024-12-12 07:53:54 |
45.79.198.18 | c2_metasploit | 3790 | Critical/Critical | us | 2024-12-12 15:19:52 |
31.207.45.151 | c2_metasploit | 3790 | Safe/Critical | nl | 2024-12-12 13:28:33 |