Systems that are infected with or involved in spreading malware and ransomware.
Known botnet and C&C servers, these have responded with a valid botnet C2 response.
|Intel: HTTP Server||None|
|Intel: Powered By||None|
|Intel: SSH Server||None|
|SENSE list (high risk)||Yes|
|One day public list||Yes|
|Seven day public list||Yes|
Threat History [last 14 days]
|2022-09-13 00:19:18||Internal||Threat score opinion changed to 79.|
|2022-09-13 00:19:17||Internal||Threat score opinion changed to 66.|
|2022-09-11 00:19:27||Internal||Threat score opinion changed to 62.|
|2022-09-11 00:19:26||Internal||Threat score opinion changed to 70.|
|2022-09-08 00:20:18||Internal||Threat score opinion changed to 53.|
|2022-09-08 00:20:16||Internal||Threat score opinion changed to 66.|
|2022-09-07 00:20:10||Internal||Threat score opinion changed to 49.|
|2022-09-06 06:29:19||Internal||Threat score opinion changed to 62.|
|2022-09-06 06:29:18||Botnets||Botnets confirmation received.|
|2022-09-06 04:42:34||Internal||Threat score opinion changed to 41.|
|2022-09-06 04:42:20||Malware||Malware confirmation received.|
You may enter an IP address to check if it is blocked on NovaSense. If you have an IP address which is incorrectly blocked you may then request an exception.
Snapt users: you may whitelist IP addresses on your ADC to immediately ignore matches in NovaSense.