Solved

Ways to determine if a remote IP is malicious

Posted on 2014-04-14
15
696 Views
Last Modified: 2014-04-16
For the last few days, our IPS detected that about 1 remote IP address per 1-2 days out
there in the Internet that attempted to access our site are triggering Heartbeat signature alerts.  However, we & the IPS vendor can't be certain if these are false positives.

At 1-2 IP addresses, it may be manageable to block those IP & after say several months,
lift up the rules that block them but we're concerned that

Q1:
Is there any website, mailing list or any method out there that help determine if
the remote source IP addresses are known to be malicious?

Q2:
If I use our local ISP's DNS to do nslookup & it returned that the IP is of
'Non-existent domain', can I safely block it & assume it's malicious?  I'm
assuming a non-existent or non-registered IP has malicious intent

Q3:
Appreciate if anyone can take a look & tell me if the following IP are known
to be malicious or related to Heartbeat?
62.76.40.157     ==>       62-76-40-157.clodo.ru
180.153.198.13 ==>       Non-existent domain
165.124.184.128 ==>  hamsa.cs.northwestern.edu
180.153.195.117 ==> Non-existent domain
180.153.196.193 ==> Non-existent domain
10.251.87.209     ==>  Non-existent domain

Q4:
Can I take the approach to block first & when a  a genuine/non-malicious user
call up to complain his access is blocked, then only unblock it?  So assume
malicious unless proven otherwise.  I suppose this is feasible if we're not
getting lots of IP daily to block.
0
Comment
Question by:sunhux
15 Comments
 

Author Comment

by:sunhux
ID: 40000884
A few more:

54.234.94.143      ec2-54-234-94-143.10.251.87.209
54.81.153.80      ec2-54-81-153-80.compute-1.amazonaws.com
54.198.183.170      ec2-54-198-183-170.compute-1.amazonaws.com
54.82.249.111      ec2-54-82-249-111.compute-1.amazonaws.com
0
 

Author Comment

by:sunhux
ID: 40000977
Can I say that often those suspicious remote IPs are 'spoofed' by
the attacker, ie amended in the data packets so might as well
just block them.

If the attacker is using a constantly/frequently changing IP, then
this approach of block & after a few months, unblock will be
too tedious for us, right?
0
 
LVL 82

Assisted Solution

by:Dave Baldwin
Dave Baldwin earned 80 total points
ID: 40001012
Domains aren't the only things that have IP addresses.  All of the IP addresses above that start with 180 are from Shanghai China.  The 164 is from Northwestern University.

10.251.87.209 is a private non-routable and should be on your own LAN.!
0
 
LVL 25

Assisted Solution

by:Tony Giangreco
Tony Giangreco earned 240 total points
ID: 40001473
If you have a firewall, you should be able to setup a block of any IP.

You can run a reverse lookup on an IP address to see what domains are on it:
http://www.yougetsignal.com/tools/web-sites-on-web-server/

You can check a site's overall security from a malware standpoint with this link
http://www.unmaskparasites.com/

Here is a heartbleed checker
https://lastpass.com/heartbleed/

Here is a free web security scanner
http://websecuritytool.codeplex.com/
0
 

Author Comment

by:sunhux
ID: 40001589
http://www.unmaskparasites.com/
Suppose I don't have a website but just some Internet connections
that are outgoing, I suppose the above won't help.

is there any link that could assess if an Internet IP addr is malicious?
I would like to assess the remote IP, not my own site's IP
0
 
LVL 25

Assisted Solution

by:Tony Giangreco
Tony Giangreco earned 240 total points
ID: 40001600
You can track then down with this tool
http://www.geobytes.com/IpLocator.htm

That IP resolves to webcluster.oversun.clodo.ru

Take that address on MxToolbox and run some tests.
0
 
LVL 25

Expert Comment

by:Tony Giangreco
ID: 40001603
If you don't have a firewall, you can install ZoneAlarm and block the ip with that software firewall
0
Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

 

Author Comment

by:sunhux
ID: 40001625
0
 
LVL 25

Expert Comment

by:Tony Giangreco
ID: 40001635
From the warning at the top of the screen, I would say yes.

It may be they don't have an SSL certificate or other security requirement installed to be considered safe, of they could have been reported as sending spam.
0
 
LVL 14

Accepted Solution

by:
Giovanni Heward earned 180 total points
ID: 40001933
Here's some additional references.  Modify the IP address in the URI accordingly.

http://sitecheck2.sucuri.net/results/62.76.40.157
https://www.virustotal.com/en/ip-address/62.76.40.157/information/
0
 
LVL 25

Expert Comment

by:Tony Giangreco
ID: 40002941
Have we answered your question?
0
 

Author Comment

by:sunhux
ID: 40003032
Yes.


http://sitecheck2.sucuri.net/results/62.76.40.157
In particular, I'm looking for URL like the above.  If there's
more (eg: by other Service Providers other than the 8
listed, say TrendMicro, Checkpoint etc, will be good to
add on to the list as well.
0
 
LVL 25

Expert Comment

by:Tony Giangreco
ID: 40003033
Ok, are you going to block it?
0
 
LVL 25

Expert Comment

by:Tony Giangreco
ID: 40003043
Try zone alarm. They have different versions. You will see all alerts of IP's trying to access your network
0
 

Author Comment

by:sunhux
ID: 40003368
Wonderful;  I'll block only those that the sites

http://sitecheck2.sucuri.net/results/a.b.c.d
& http://www.malwaredomainlist.com/

had listed as known malicious sources
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
This article explains in simple steps how to renew expiring Exchange Server Internal Transport Certificate.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now