Abuse SSL
Verified
Open Source Threat Intel
Overview
The connector uses the an Abuse-ssl csv file that lists botnet ips detected based on certain ssl signatures An SSL certificate can be associated with one or more servers (IP address:port combination). SSLBL collects IP addresses that are running with
The connector uses the an Abuse-ssl csv file that lists botnet ips detected based on certain ssl signatures An SSL certificate can be associated with one or more servers (IP address:port combination). SSLBL collects IP addresses that are running with an SSL certificate blacklisted on SSLBL. These are usually botnet Command&Control servers (C&C). SSLBL hence publishes a blacklist containing these IPs which can be used to detect botnet C2 traffic from infected machines towards the internet, leaving your network. The CSV format is useful if you want to process the blacklisted IP addresses further, e.g. loading them into your SIEM or CTI (or both, don't be shy).