XTM Hub by FiligranSign In
Abuse SSL logo

Abuse SSL

Verified
Open Source Threat Intel

Overview

The connector uses the an Abuse-ssl csv file that lists botnet ips detected based on certain ssl signatures An SSL certificate can be associated with one or more servers (IP address:port combination). SSLBL collects IP addresses that are running with

The connector uses the an Abuse-ssl csv file that lists botnet ips detected based on certain ssl signatures An SSL certificate can be associated with one or more servers (IP address:port combination). SSLBL collects IP addresses that are running with an SSL certificate blacklisted on SSLBL. These are usually botnet Command&Control servers (C&C). SSLBL hence publishes a blacklist containing these IPs which can be used to detect botnet C2 traffic from infected machines towards the internet, leaving your network. The CSV format is useful if you want to process the blacklisted IP addresses further, e.g. loading them into your SIEM or CTI (or both, don't be shy).

Basic information

Abuse SSL
External import
6.8.13
0
    Abuse SSL | OpenCTI Integration Library | XTM Hub by Filigran