Skip to main content
Version: v1.5.0

Taxonomy

Scoring

  • scores: Indicators of malevolence associated with an IP address, computed over several periods of time : 1 day, 1 week, 1 month and overall. For a given period, the indicator of malevolence is summarized under the total key with a value ranging from 0 (no reports) to 5 (high malevolence). This value is a summary based on 4 components (see below) also ranging from 0 (Not Applicable/ Missing) to 5 (High), comparing to all the the signals reported by the community.
indicatorexplaination
AggressivenessWhat is the intensity of the attack? This component measures the number of attacks reported over a period of time.
Threat LevelHow serious is the type of threats reported? The category of attacks reported by the community defines the danger induced by the attacks. An IP known for crawling and scanning will have a lower threat level than an IP reported for brute-force and exploits. This score ranges from 1 (mainly crawling) to 5 (exploit). 0 is the default for unknown scenarios
TrustWhat is the level of confidence in the actors which reported the IP address? This component is based on the reputation (age, number of reports) and the diversity (number of IP ranges, AS Numbers) of all the actors reporting the IP. It ranges from 0 (low_confidence) to 5 (high confidence).
AnomalyWhat are the red flags associated with this IP address? It analyses the static description of the reported IP address and checks for red flags which can be linked to evidence of malicious activities
TotalAggregation of 4 component calculated on threats reported by the community and described below.
  • ip_range_score: Score of malevolence associated with an IP range, ranging from 0 (No IP reported) to 5 (massively reported). It is calculated based on the number of IPs belonging to this range that were reported by the community as malicious

  • behaviors: One or more attack categories and behaviors associated with the IP. The category names and the associated labels should be self-explanatory. For example, sip:bruteforce would refer to an IP performing brute force attacks on the SIP protocol, while http:exploit would refer to an IP attempting to exploit known vulnerabilities on HTTP services. An exhaustive list is availabe bellow.

Fields Documentation

  • state : Only present for the "fire" route: validated means IP is currently part of community blocklist. refused means it was part of the community blocklist, but was manually purged (ie. false positive)
  • expiration: Only present for the "fire" route: Date at which the IP address expire from the community blocklist.
  • ip_range_score: the malevolence score of the IP range the IP belongs to. 0 is unknown, 1 is a couple of IP reported, 5 is the highest level for the most aggressive range. See "scoring" above
  • ip_range: the range to which the IP belongs
  • ip: the IP requested
  • as_name, as_num: The autonomous system name and number to which the IP belongs
  • location dictionary with the genreric localisation information:
    • country: the two letters country code of the IP following ISO 3166 format, when available
    • city: the associated city name of the IP, when available
    • latitude, longitude: floating points coordinates of the IP, when available
  • reverse_dns: reverse DNS lookup of the IP, when available
  • behaviors: A list of the attack categories for which the IP was reported. Each list item contains :
    • name: category of the attack, often in the form "protocol-or-scope:attack_type". See "categories" for a non-exhaustive listing
    • label, description: Human-friendly description of the category
  • history :
    • first_seen: date of the first time this IP was reported. Please note that due to "progressive data degradation" this date might be later than the first time the IP was actually seen.
    • last_seen: date of the last time this IP was reported.
    • full_age: delta in days between first seen and today.
    • days_age: delta in days between first and last seen timestamps.
  • classifications:
    • false_positive: A list of false positives tags associated with the IP. Any IP with known_false_positive tags shouldn't be considered as malicious
    • classifications: A list of categories associated with the IP. Those data can be sourced from 3rd parties (i.e. tor exit nodes list). An exhaustive list is available bellow,
  • attack details: A more exhaustive list of the scenarios for which a given IP was reported. Each entry contains the following information :
    • name: name of the scenario (see hub.crowdsec.net)
    • label, description: Human-friendly descriptions of said scenarios
  • target_countries: The top 10 reports repartition by country about the IP, as a percentage
  • background_noise_score: Evaluate the noisiness of an IP address, from a scale of 0 (not noisy) to 10 (extremely noisy)
  • scores: Indicators of Malevolence computed on different time periods
    • overall: Malevolence score over the total period (3 months)
      • total: The aggregated malevolence score
      • aggressiveness: The score of the aggressiveness component (see above)
      • threat: The score of the threat component (see above)
      • trust: The score of the trust component (see above)
      • anomaly: The score of the anomaly component (see above)
    • last_month: Malevolence score over the last month
      • total: The aggregated malevolence score
      • aggressiveness: The score of the aggressiveness component (see above)
      • threat: The score of the threat component (see above)
      • trust: The score of the trust component (see above)
      • anomaly: The score of the anomaly component (see above)
    • last_week: Malevolence score over the last week
      • total: The aggregated malevolence score
      • aggressiveness: The score of the aggressiveness component (see above)
      • threat: The score of the threat component (see above)
      • trust: The score of the trust component (see above)
      • anomaly: The score of the anomaly component (see above)
    • last_day: Malevolence score over the last day
      • total: The aggregated malevolence score
      • aggressiveness: The score of the aggressiveness component (see above)
      • threat: The score of the threat component (see above)
      • trust: The score of the trust component (see above)
      • anomaly: The score of the anomaly component (see above)
  • references : A more open data field used to track 3rd parties referencing this IP as well. A common usage would be public / external lists in which this IP is present.

Behaviors

NameLabelDescription
database:bruteforceDatabase BruteforceIP has been reported for performing brute force on databases.
ftp:bruteforceFTP BruteforceIP has been reported for performing brute force on FTP services.
generic:exploitExploitation attemptIP has been reported trying to exploit known vulnerability/CVE on unspecified protocol.
http:bruteforceHTTP BruteforceIP has been reported for performing a HTTP brute force attack (either generic http probing or applicative related brute force).
http:crawlHTTP CrawlIP has been reported for performing aggressive crawling of web applications.
http:exploitHTTP ExploitIP has been reported for attempting to exploit a vulnerability in a web application.
http:scanHTTP ScanIP has been reported for performing actions related to HTTP vulnerability scanning and discovery.
http:spamWeb form spamIP has been reported trying to perform spam via web forms/forums.
iot:bruteforceIOT BruteforceIP has been reported for performing brute force on IOT management interfaces.
ldap:bruteforceLDAP BruteforceIP has been reported for performing brute force on ldap services.
pop3/imap:bruteforcePOP3/IMAP BruteforceIP has been reported for performing a POP3/IMAP brute force attack.
sip:bruteforceSIP BruteforceIP has been reported for performing a SIP (VOIP) brute force attack.
smb:bruteforceSMB BruteforceIP has been reported for performing brute force on samba services.
smtp:spamSMTP spamIP has been reported trying to perform spam SMTP service.
ssh:bruteforceSSH BruteforceIP has been reported for performing brute force on ssh services.
tcp:scanTCP ScanIP has been reported for performing TCP port scanning.
telnet:bruteforceTELNET BruteforceIP has been reported for performing brute force on telnet services.
vm-management:bruteforceVM Management BruteforceIP has been reported for performing brute force on virtual environement management applications.
windows:bruteforceSMB/RDP bruteforceIP has been reported for performing brute force on Windows (samba, remote desktop) services.

False positives

NameLabelDescription
cdn:cloudflare_exit_nodeCloudflare CDNIP is a Cloudflare CDN exit IP and should not be flagged as a threat.
cdn:exit_nodeCDN exit nodeIP is a CDN exit IP and should not be flagged as a threat.
ip:private_rangePrivate IP address rangeThis IP address is in a private IP range
msp:scannerLegitimate ScannerIP belongs to a known 'legitimate' scanner (MSP) and should not be flagged as a threat.
seo:crawlerSEO crawlerIP belongs to a known SEO crawler and should not be flagged as a threat.
seo:duckduckbotDuckduckbot SEO crawlerIP belongs to Duckduckbot SEO crawler and should not be flagged as a threat.
seo:pinterestPinterest crawlerIP belongs to Pinterest crawler and should not be flagged as a threat.
seo:crawlerSEO crawlerIP belongs to a known SEO crawler and should not be flagged as a threat.

Classifications

NameLabelDescription
community-blocklistCrowdSec Community BlocklistIP belong to the CrowdSec Community Blocklist
profile:insecure_servicesDangerous Services ExposedIP exposes dangerous services (vnc, telnet, rdp), possibly due to a misconfiguration or because it's a honeypot.
profile:many_servicesMany Services ExposedIP exposes many open port, possibly due to a misconfiguration or because it's a honeypot.
proxy:torTOR exit nodeIP is being flagged as a TOR exit node.
proxy:vpnVPNIP exposes a VPN service or is being flagged as one.
range:data_centerData CenterIP is known to be hosted in a data center.
scanner:alphastrikeKnown Security CompanyIP belongs to a company that scans internet : AlphaSrike.
scanner:binaryedgeKnown Security CompanyIP belongs to a company that scans internet : binaryedge.
scanner:censysKnown Security CompanyIP belongs to a company that scans internet : Censys.
scanner:cert.ssi.gouv.frKnown CERTIP belongs to an entity that scans internet : cert.ssi.gouv.fr.
scanner:cisa.dhs.govKnown CERTIP belongs to an entity that scans internet : cisa.dhs.gov.
scanner:internet-censusKnown Security CompanyIP belongs to a company that scans internet : internet-census.
scanner:leakixKnown Security CompanyIP belongs to a company that scans internet : leakix.
scanner:legitLegit scannerIP belongs to a company that scans internet
scanner:shadowserver.orgKnown Security CompanyIP belongs to an entity that scans internet : www.shadowserver.org.
scanner:shodanKnown Security CompanyIP belongs to a company that scans internet : Shodan.
scanner:stretchoidKnown Security CompanyIP belongs to an entity that scans internet : stretchoid.
profile:fake_rdnsFake RDNSIP is using a fake RDNS
profile:nxdomainNXDOMAINRDNS doesn't exist
profile:routerRouterIP belongs to a router exping services on the internet
profile:proxyProxyIP exposes services that are commonly used by proxies
profile:jupiter-vpnJupiterVPNIP belongs to a jupiter vpn
device:cyberoamCyberoamIP belongs to a Cyberoam router
device:microtikMikrotikIP belongs to a Mikrotik router
device:asuswrtAsusWRTIP belongs to a AsusWRT router
device:hikvisionHikvisionIP belongs to a Hikvision camera
device:ipcamIpCameraIP belongs to a IP camera
profile:likely_botnetLikely BotnetIP is likely to belong to a botnet (based on behaviour and/or characteristics)