<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p style="text-align: justify;">When an IP is in a number of blocklists and it tries to make over 20 Million (yes, you read that right!) connection attempts with our customer devices, it definitely catches our attention. This is exactly what the IP address 89.248.165[.]118 did. Just Memorial Day morning showed around 30K hits in our customer logs from this IP.</p> <p style="text-align: justify;"><!--more-->So what is this pesky address doing? According to <a href="https://www.abuseipdb.com/check/89.248.165.118" rel="noopener" target="_blank">AbuseIPDB</a>, the IP <span>89.248.165[.]118 has been reported over five thousand times as partaking in port scanning and brute force activities. <a href="https://otx.alienvault.com/indicator/ip/89.248.165.118" rel="noopener" target="_blank">AlienVault's OTX </a>shows 17 different user-created threat pulses based on Honeypot logs that include the IP, and two threat intelligence vendors claim it to be malicious on <a href="https://www.virustotal.com/gui/ip-address/89.248.165.118/detection" rel="noopener" target="_blank">VirusTotal</a>. As shown in <a href="https://check-ioc.threatstop.com/ioc/89.248.165.118" rel="noopener" target="_blank">ThreatSTOP's CheckIOC results</a>, DShield, CINS Army and APWG also deemed the IP malicious due to its constant scanning attempts. Yet a look at the IP's Whois information shows what claims to be a legit project called the "Recyber Project":</span></p> <p style="text-align: justify;"><span><img src="https://info.threatstop.com/hubfs/image-png-May-31-2021-04-21-00-53-PM.png" loading="lazy" alt="recyber project whois"></span></p> <p style="text-align: justify; font-size: 12px;"><em>Image: Virustotal</em></p> <p style="text-align: justify;">&nbsp;</p> <p style="text-align: justify;">Visiting the website listed under their Whois information, we get an uninformative webpage with two sentences that does not say enough for an unfamiliar person to understand if this is really a legitimate security project.&nbsp;</p> <p style="text-align: justify;"><img src="https://info.threatstop.com/hubfs/image-png-May-31-2021-04-33-24-37-PM.png" loading="lazy" alt="recyber project"></p> <p style="text-align: justify; font-size: 12px;">Image: Recyber</p> <p style="text-align: justify;">&nbsp;</p> <p style="text-align: justify;">Not too long ago, we started raising the question on our blog - what do we do when good IPs behave badly? This gets even harder when a user cannot easily tell if the IP is actually legitimate, though it claims to be. At ThreatSTOP, we believe in a default of caution. If it looks fishy, and there's no big downside to barring the IP from your network, block it. You may end up thanking us for that later. ThreatSTOP uses over 800 threat intelligence sources to integrate the best leads on long-standing, as well as recently debuted threats, balancing between the necessary caution to catch more threats before they reach your network, and sophisticated protection logic to avoid false positives. Among our blocklists, we provide a number of targets that include scanner and scanning attack IOCs, including SNMP, SSH, Telnet, DNS, SMB, VOIP H323, SIP and Telephony Abuse, IMAP, FTP, Brute Force attacks and more.</p> <p style="text-align: justify;">ThreatSTOP also offers a target bundle, <em>Monitoring Services IPs</em>, that lets users whitelist legitimate third-party companies that monitor network connectivity and uptime for their clients’ infrastructure. These services can sometimes be mistaken for scans and malicious activity, and whitelisting their IPs ensures these services do not get blocked for customers who use them to monitor their networks.</p> <p style="text-align: justify;">&nbsp;</p> <p style="text-align: center; font-weight: bold;"><em>Ready to try ThreatSTOP in your network? Want an expert-led demo to see how it works?</em></p> <p style="text-align: center;"></p></span>