Systems that are infected with or involved in spreading malware and ransomware.
Known botnet and C&C servers, these have responded with a valid botnet C2 response.
|Intel: HTTP Server||None|
|Intel: Powered By||None|
|Intel: SSH Server||None|
|SENSE list (high risk)||Yes|
|One day public list||Yes|
|Seven day public list||Yes|
|2021-03-15 00:09:58||Internal||Threat score opinion changed from 62 to 66.|
|2021-03-12 00:15:11||Internal||Threat score opinion changed from 66 to 79.|
|2021-03-12 00:03:45||Internal||Threat score opinion changed from 53 to 62.|
|2021-03-10 00:09:19||Internal||Threat score opinion changed from 49 to 53.|
|2021-03-09 00:09:53||Internal||Threat score opinion changed from 0 to 49.|
|2021-03-08 09:43:02||Malware||Malware confirmation received.|
|2021-02-07 11:29:43||Botnets||Botnet confirmation received.|
|2021-01-08 11:29:42||Botnets||Botnet confirmation received.|
|2020-12-09 10:29:45||Botnets||Botnet confirmation received.|
|2020-11-09 09:29:40||Botnets||Botnet confirmation received.|
You may enter an IP address to check if it is blocked on NovaSense. If you have an IP address which is incorrectly blocked you may then request an exception.
Snapt users: you may whitelist IP addresses on your ADC to immediately ignore matches in NovaSense.